Skip to content

Security Overview

Helm-Chart

Scan Results

Chart Object: meshroom/templates/common.yaml

Type Misconfiguration ID Check Severity Explaination Links
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv001
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv001
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/misconfig/ksv003
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/misconfig/ksv003
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv012
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/misconfig/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/misconfig/ksv014
Kubernetes Security Check KSV017 Privileged container HIGH
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.privileged' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/misconfig/ksv017
Kubernetes Security Check KSV020 Runs with low user ID LOW
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv020
Kubernetes Security Check KSV020 Runs with low user ID LOW
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv020
Kubernetes Security Check KSV021 Runs with low group ID LOW
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-meshroom' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv021
Kubernetes Security Check KSV021 Runs with low group ID LOW
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-meshroom' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv021
Kubernetes Security Check KSV030 Default Seccomp profile not set LOW
Expand... The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles.


Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv030
Kubernetes Security Check KSV030 Default Seccomp profile not set LOW
Expand... The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles.


Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv030
Kubernetes Security Check KSV105 Containers must not set runAsUser to 0 LOW
Expand... Containers should be forbidden from running with a root UID.


securityContext.runAsUser should be set to a value greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv105
Kubernetes Security Check KSV105 Containers must not set runAsUser to 0 LOW
Expand... Containers should be forbidden from running with a root UID.


securityContext.runAsUser should be set to a value greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv105
Kubernetes Security Check KSV106 Container capabilities must only include NET_BIND_SERVICE LOW
Expand... Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability.


container should drop all
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv106
Kubernetes Security Check KSV106 Container capabilities must only include NET_BIND_SERVICE LOW
Expand... Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability.


container should drop all
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv106

Containers

Detected Containers
      tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730
      alicevision/meshroom:2021.1.0-av2.4.0-centos7-cuda10.2@sha256:1cadc1a8f5edd8ebbf8de20df5cf1d6e44ee0aad4ebbb8939018fe0beadc2dad
Scan Results

Container: tccr.io/truecharts/alpine:v3.16.0@sha256:16dc15f3d61a1e30b1df9f839e53636847b6097286b2b74c637b25fd8264f730 (alpine 3.16.0)

alpine

No Vulnerabilities found

Container: alicevision/meshroom:2021.1.0-av2.4.0-centos7-cuda10.2@sha256:1cadc1a8f5edd8ebbf8de20df5cf1d6e44ee0aad4ebbb8939018fe0beadc2dad (centos 7.7.1908)

centos

Package Vulnerability Severity Installed Version Fixed Version Links
audit-libs CVE-2015-5186 MEDIUM 2.8.5-4.el7
Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9
http://www.securityfocus.com/bid/76840
https://access.redhat.com/security/cve/CVE-2015-5186
https://bugzilla.redhat.com/show_bug.cgi?id=1251621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186
https://fedorahosted.org/audit/changeset/1122
https://people.redhat.com/sgrubb/audit/ChangeLog
audit-libs-python CVE-2015-5186 MEDIUM 2.8.5-4.el7
Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9
http://www.securityfocus.com/bid/76840
https://access.redhat.com/security/cve/CVE-2015-5186
https://bugzilla.redhat.com/show_bug.cgi?id=1251621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186
https://fedorahosted.org/audit/changeset/1122
https://people.redhat.com/sgrubb/audit/ChangeLog
bash CVE-2012-6711 MEDIUM 4.2.46-33.el7
Expand...http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
http://www.securityfocus.com/bid/108824
https://access.redhat.com/security/cve/CVE-2012-6711
https://bugzilla.redhat.com/show_bug.cgi?id=1721071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711
https://support.f5.com/csp/article/K05122252
https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4180-1
https://usn.ubuntu.com/4180-1/
bash CVE-2019-9924 MEDIUM 4.2.46-33.el7 4.2.46-34.el7
Expand...http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-9924
https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924
https://linux.oracle.com/cve/CVE-2019-9924.html
https://linux.oracle.com/errata/ELSA-2020-1113.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
https://lists.gnu.org/archive/html/bug-bash/2017-03/msg00077.html
https://security.netapp.com/advisory/ntap-20190411-0001/
https://ubuntu.com/security/notices/USN-4058-1
https://ubuntu.com/security/notices/USN-4058-2
https://usn.ubuntu.com/4058-1/
https://usn.ubuntu.com/4058-2/
bash CVE-2019-18276 LOW 4.2.46-33.el7
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
bind-license CVE-2020-8616 HIGH 32:9.11.4-9.P2.el7 32:9.11.4-16.P2.el7_8.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://www.nxnsattack.com
http://www.openwall.com/lists/oss-security/2020/05/19/4
https://access.redhat.com/security/cve/CVE-2020-8616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
https://kb.isc.org/docs/cve-2020-8616
https://linux.oracle.com/cve/CVE-2020-8616.html
https://linux.oracle.com/errata/ELSA-2020-2383.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://ubuntu.com/security/notices/USN-4365-1
https://ubuntu.com/security/notices/USN-4365-2
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689
https://www.synology.com/security/advisory/Synology_SA_20_12
https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/
bind-license CVE-2020-8617 HIGH 32:9.11.4-9.P2.el7 32:9.11.4-16.P2.el7_8.6
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html
http://www.openwall.com/lists/oss-security/2020/05/19/4
https://access.redhat.com/security/cve/CVE-2020-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
https://kb.isc.org/docs/cve-2020-8617
https://linux.oracle.com/cve/CVE-2020-8617.html
https://linux.oracle.com/errata/ELSA-2020-2383.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://ubuntu.com/security/notices/USN-4365-1
https://ubuntu.com/security/notices/USN-4365-2
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689
bind-license CVE-2020-8625 HIGH 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.4
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/1
http://www.openwall.com/lists/oss-security/2021/02/20/2
https://access.redhat.com/security/cve/CVE-2020-8625
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625
https://kb.isc.org/docs/cve-2020-8625
https://kb.isc.org/v1/docs/cve-2020-8625
https://linux.oracle.com/cve/CVE-2020-8625.html
https://linux.oracle.com/errata/ELSA-2021-9117.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/
https://nvd.nist.gov/vuln/detail/CVE-2020-8625
https://security.netapp.com/advisory/ntap-20210319-0001/
https://ubuntu.com/security/notices/USN-4737-1
https://ubuntu.com/security/notices/USN-4737-2
https://www.debian.org/security/2021/dsa-4857
https://www.zerodayinitiative.com/advisories/ZDI-21-195/
bind-license CVE-2021-25215 HIGH 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.5
Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1
http://www.openwall.com/lists/oss-security/2021/04/29/2
http://www.openwall.com/lists/oss-security/2021/04/29/3
http://www.openwall.com/lists/oss-security/2021/04/29/4
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json
https://access.redhat.com/security/cve/CVE-2021-25215
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215
https://kb.isc.org/docs/cve-2021-25215
https://kb.isc.org/v1/docs/cve-2021-25215
https://linux.oracle.com/cve/CVE-2021-25215.html
https://linux.oracle.com/errata/ELSA-2021-9213.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
https://nvd.nist.gov/vuln/detail/CVE-2021-25215
https://security.netapp.com/advisory/ntap-20210521-0006/
https://ubuntu.com/security/notices/USN-4929-1
https://www.debian.org/security/2021/dsa-4909
https://www.oracle.com/security-alerts/cpuoct2021.html
bind-license CVE-2019-6477 MEDIUM 32:9.11.4-9.P2.el7 32:9.11.4-16.P2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2019-6477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477
https://kb.isc.org/docs/cve-2019-6477
https://linux.oracle.com/cve/CVE-2019-6477.html
https://linux.oracle.com/errata/ELSA-2020-1845.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3DEMNZMKR57VQJCG5ZN55ZGTQRL2TFQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGURMGQHX45KR4QDRCSUQHODUFOGNGAN/
https://support.f5.com/csp/article/K15840535?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4197-1
https://www.debian.org/security/2020/dsa-4689
https://www.synology.com/security/advisory/Synology_SA_19_39
bind-license CVE-2020-8622 MEDIUM 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
https://kb.isc.org/docs/cve-2020-8622
https://linux.oracle.com/cve/CVE-2020-8622.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8622
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://ubuntu.com/security/notices/USN-4468-2
https://usn.ubuntu.com/4468-1/
https://usn.ubuntu.com/4468-2/
https://www.debian.org/security/2020/dsa-4752
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.synology.com/security/advisory/Synology_SA_20_19
bind-license CVE-2020-8623 MEDIUM 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
https://kb.isc.org/docs/cve-2020-8623
https://linux.oracle.com/cve/CVE-2020-8623.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8623
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://usn.ubuntu.com/4468-1/
https://www.debian.org/security/2020/dsa-4752
https://www.synology.com/security/advisory/Synology_SA_20_19
bind-license CVE-2020-8624 MEDIUM 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.2
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-8624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
https://kb.isc.org/docs/cve-2020-8624
https://linux.oracle.com/cve/CVE-2020-8624.html
https://linux.oracle.com/errata/ELSA-2020-5011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://nvd.nist.gov/vuln/detail/CVE-2020-8624
https://security.gentoo.org/glsa/202008-19
https://security.netapp.com/advisory/ntap-20200827-0003/
https://ubuntu.com/security/notices/USN-4468-1
https://usn.ubuntu.com/4468-1/
https://www.debian.org/security/2020/dsa-4752
https://www.synology.com/security/advisory/Synology_SA_20_19
bind-license CVE-2021-25214 MEDIUM 32:9.11.4-9.P2.el7 32:9.11.4-26.P2.el7_9.7
Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1
http://www.openwall.com/lists/oss-security/2021/04/29/2
http://www.openwall.com/lists/oss-security/2021/04/29/3
http://www.openwall.com/lists/oss-security/2021/04/29/4
https://access.redhat.com/security/cve/CVE-2021-25214
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214
https://kb.isc.org/docs/cve-2021-25214
https://kb.isc.org/v1/docs/cve-2021-25214
https://linux.oracle.com/cve/CVE-2021-25214.html
https://linux.oracle.com/errata/ELSA-2021-4384.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
https://nvd.nist.gov/vuln/detail/CVE-2021-25214
https://security.netapp.com/advisory/ntap-20210521-0006/
https://ubuntu.com/security/notices/USN-4929-1
https://www.debian.org/security/2021/dsa-4909
bind-license CVE-2021-25219 MEDIUM 32:9.11.4-9.P2.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-25219
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://errata.almalinux.org/8/ALSA-2022-2092.html
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://linux.oracle.com/cve/CVE-2021-25219.html
https://linux.oracle.com/errata/ELSA-2022-2092.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://nvd.nist.gov/vuln/detail/CVE-2021-25219
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
https://www.oracle.com/security-alerts/cpuapr2022.html
bind-license CVE-2021-25220 MEDIUM 32:9.11.4-9.P2.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-25220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
https://kb.isc.org/docs/CVE-2021-25220
https://kb.isc.org/v1/docs/cve-2021-25220
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-25220
https://security.netapp.com/advisory/ntap-20220408-0001/
https://ubuntu.com/security/notices/USN-5332-1
https://ubuntu.com/security/notices/USN-5332-2
bind-license CVE-2013-5661 LOW 32:9.11.4-9.P2.el7
Expand...https://access.redhat.com/security/cve/CVE-2013-5661
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661
https://security-tracker.debian.org/tracker/CVE-2013-5661
bind-license CVE-2016-6170 LOW 32:9.11.4-9.P2.el7
Expand...http://www.openwall.com/lists/oss-security/2016/07/06/3
http://www.securityfocus.com/bid/91611
http://www.securitytracker.com/id/1036241
https://access.redhat.com/security/cve/CVE-2016-6170
https://bugzilla.redhat.com/show_bug.cgi?id=1353563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170
https://github.com/sischkg/xfer-limit/blob/master/README.md
https://kb.isc.org/article/AA-01390
https://kb.isc.org/article/AA-01390/0/Operational-Notification%3A-A-party-that-is-allowed-control-over-zone-data-can-overwhelm-a-server-by-transferring-huge-quantities-of-data.html
https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
https://security.gentoo.org/glsa/201610-07
bind-license CVE-2018-5745 LOW 32:9.11.4-9.P2.el7 32:9.11.4-16.P2.el7
Expand...https://access.redhat.com/errata/RHSA-2019:3552
https://access.redhat.com/security/cve/CVE-2018-5745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745
https://kb.isc.org/docs/cve-2018-5745
https://linux.oracle.com/cve/CVE-2018-5745.html
https://linux.oracle.com/errata/ELSA-2020-1061.html
https://ubuntu.com/security/notices/USN-3893-1
https://ubuntu.com/security/notices/USN-3893-2
bind-license CVE-2019-6465 LOW 32:9.11.4-9.P2.el7 32:9.11.4-16.P2.el7
Expand...https://access.redhat.com/errata/RHSA-2019:3552
https://access.redhat.com/security/cve/CVE-2019-6465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465
https://kb.isc.org/docs/cve-2019-6465
https://linux.oracle.com/cve/CVE-2019-6465.html
https://linux.oracle.com/errata/ELSA-2020-1061.html
https://ubuntu.com/security/notices/USN-3893-1
https://ubuntu.com/security/notices/USN-3893-2
binutils CVE-2017-6965 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-6965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21137
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-6966 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-6966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21139
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-20673 MEDIUM 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
binutils CVE-2019-9074 MEDIUM 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://nvd.nist.gov/vuln/detail/CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9075 MEDIUM 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://nvd.nist.gov/vuln/detail/CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-9077 MEDIUM 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://access.redhat.com/security/cve/CVE-2019-9077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2020-16590 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-16590
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
binutils CVE-2020-16592 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-16592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
binutils CVE-2021-20197 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20197
https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20197
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
binutils CVE-2021-20294 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20294
https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-20294
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
binutils CVE-2021-3487 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3487
https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3487
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2021-37322 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37322
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
https://nvd.nist.gov/vuln/detail/CVE-2021-37322
binutils CVE-2021-42574 MEDIUM 2.27-41.base.el7 2.27-44.base.el7_9.1
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
binutils CVE-2021-45078 MEDIUM 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2014-9939 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2015/07/31/6
https://access.redhat.com/security/cve/CVE-2014-9939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939
https://sourceware.org/bugzilla/show_bug.cgi?id=18750
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
https://ubuntu.com/security/notices/USN-3367-1
binutils CVE-2015-8538 LOW 2.27-41.base.el7
Expand...http://sourceforge.net/p/libdwarf/code/ci/da724a0bc5eec8e9ec0b0cb0c238a80e34466459/
http://www.openwall.com/lists/oss-security/2015/12/09/2
http://www.openwall.com/lists/oss-security/2015/12/10/3
https://access.redhat.com/security/cve/CVE-2015-8538
https://bugzilla.redhat.com/show_bug.cgi?id=1289385
https://bugzilla.redhat.com/show_bug.cgi?id=1291299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8538
binutils CVE-2016-2226 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
binutils CVE-2016-4487 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4488 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4489 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4490 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4491 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4492 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2016-4493 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12449 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12451 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451
https://sourceware.org/bugzilla/show_bug.cgi?id=21786
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12452 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12453 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12454 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12455 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12456 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12457 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12458 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12799 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100292
https://access.redhat.com/security/cve/CVE-2017-12799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21933
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-12967 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100462
https://access.redhat.com/security/cve/CVE-2017-12967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21962
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-13710 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100499
https://access.redhat.com/security/cve/CVE-2017-13710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13710
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d6f8dea6798528de0fc762409595251eeeb1f547
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-13716 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-13716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
binutils CVE-2017-13757 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100532
https://access.redhat.com/security/cve/CVE-2017-13757
https://sourceware.org/bugzilla/show_bug.cgi?id=22018
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
binutils CVE-2017-14128 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100623
https://access.redhat.com/security/cve/CVE-2017-14128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22059
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14129 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100624
https://access.redhat.com/security/cve/CVE-2017-14129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22047
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14130 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/100625
https://access.redhat.com/security/cve/CVE-2017-14130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22058
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14529 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529
https://sourceware.org/bugzilla/show_bug.cgi?id=22113
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14729 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14729
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/
https://sourceware.org/bugzilla/show_bug.cgi?id=22170
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
binutils CVE-2017-14745 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14745
https://sourceware.org/bugzilla/show_bug.cgi?id=22148
binutils CVE-2017-14930 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14930
https://sourceware.org/bugzilla/show_bug.cgi?id=22191
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a26a013f22a19e2c16729e64f40ef8a7dfcc086e
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14932 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14932
https://sourceware.org/bugzilla/show_bug.cgi?id=22204
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14933 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101203
https://access.redhat.com/security/cve/CVE-2017-14933
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22210
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
binutils CVE-2017-14934 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101204
https://access.redhat.com/security/cve/CVE-2017-14934
https://sourceware.org/bugzilla/show_bug.cgi?id=22219
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b
binutils CVE-2017-14938 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101212
https://access.redhat.com/security/cve/CVE-2017-14938
https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14938
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14939 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101216
https://access.redhat.com/security/cve/CVE-2017-14939
https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14939
https://sourceware.org/bugzilla/show_bug.cgi?id=22169
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42970/
binutils CVE-2017-14940 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14940
https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14940
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-14974 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14974
https://sourceware.org/bugzilla/show_bug.cgi?id=22163
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
binutils CVE-2017-15020 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15020
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
https://sourceware.org/bugzilla/show_bug.cgi?id=22202
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15021 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15021
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
https://sourceware.org/bugzilla/show_bug.cgi?id=22197
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15022 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15022
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
https://sourceware.org/bugzilla/show_bug.cgi?id=22201
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15023 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101611
https://access.redhat.com/security/cve/CVE-2017-15023
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
binutils CVE-2017-15024 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15024
https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
https://sourceware.org/bugzilla/show_bug.cgi?id=22187
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15025 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15025
https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
https://sourceware.org/bugzilla/show_bug.cgi?id=22186
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15225 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15225
https://sourceware.org/bugzilla/show_bug.cgi?id=22212
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15938 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101610
https://access.redhat.com/security/cve/CVE-2017-15938
https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22209
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15939 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101613
https://access.redhat.com/security/cve/CVE-2017-15939
https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22205
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a54018b72d75abf2e74bf36016702da06399c1d9
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-15996 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101608
https://access.redhat.com/security/cve/CVE-2017-15996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22361
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16826 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22376
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16827 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22306
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16828 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22386
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16829 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16829
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22307
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163
binutils CVE-2017-16830 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/101941
https://access.redhat.com/security/cve/CVE-2017-16830
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22384
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
binutils CVE-2017-16831 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22385
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-16832 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22373
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17080 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22421
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17121 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22506
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17122 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22508
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f
https://ubuntu.com/security/notices/USN-5341-1
binutils CVE-2017-17123 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22509
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17124 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22507
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17125 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22443
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-17126 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17126
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22510
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8
binutils CVE-2017-6969 LOW 2.27-41.base.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/16/8
http://www.securityfocus.com/bid/97065
https://access.redhat.com/security/cve/CVE-2017-6969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21156
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7209 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/96994
https://access.redhat.com/security/cve/CVE-2017-7209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21135
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7210 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/96992
https://access.redhat.com/security/cve/CVE-2017-7210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21157
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7223 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20898
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7224 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97277
https://access.redhat.com/security/cve/CVE-2017-7224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20892
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7225 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97275
https://access.redhat.com/security/cve/CVE-2017-7225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20891
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7226 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226
https://sourceware.org/bugzilla/show_bug.cgi?id=20905
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7227 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97209
https://access.redhat.com/security/cve/CVE-2017-7227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20906
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7299 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97217
https://access.redhat.com/security/cve/CVE-2017-7299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299
https://sourceware.org/bugzilla/show_bug.cgi?id=20908
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7300 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97219
https://access.redhat.com/security/cve/CVE-2017-7300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300
https://sourceware.org/bugzilla/show_bug.cgi?id=20909
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7301 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97218
https://access.redhat.com/security/cve/CVE-2017-7301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301
https://sourceware.org/bugzilla/show_bug.cgi?id=20924
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7302 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97216
https://access.redhat.com/security/cve/CVE-2017-7302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302
https://sourceware.org/bugzilla/show_bug.cgi?id=20921
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-7303 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97213
https://access.redhat.com/security/cve/CVE-2017-7303
https://sourceware.org/bugzilla/show_bug.cgi?id=20922
binutils CVE-2017-7304 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/97215
https://access.redhat.com/security/cve/CVE-2017-7304
https://sourceware.org/bugzilla/show_bug.cgi?id=20931
binutils CVE-2017-7614 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7614
https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
https://security.gentoo.org/glsa/201709-02
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8392 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8392
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21409
binutils CVE-2017-8393 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21412
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8394 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21414
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8395 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21431
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8396 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21432
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8397 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21434
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8398 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21438
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-8421 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-8421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21440
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9038 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98589
https://access.redhat.com/security/cve/CVE-2017-9038
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9039 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98580
https://access.redhat.com/security/cve/CVE-2017-9039
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9040 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98579
https://access.redhat.com/security/cve/CVE-2017-9040
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9041 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98598
https://access.redhat.com/security/cve/CVE-2017-9041
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9042 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-9042
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9043 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98591
https://access.redhat.com/security/cve/CVE-2017-9043
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
binutils CVE-2017-9044 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/98587
https://access.redhat.com/security/cve/CVE-2017-9044
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9742 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99105
https://access.redhat.com/security/cve/CVE-2017-9742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21576
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42203/
binutils CVE-2017-9743 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99106
https://access.redhat.com/security/cve/CVE-2017-9743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21577
binutils CVE-2017-9744 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99108
https://access.redhat.com/security/cve/CVE-2017-9744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744
https://sourceware.org/bugzilla/show_bug.cgi?id=21578
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9745 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99109
https://access.redhat.com/security/cve/CVE-2017-9745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745
https://sourceware.org/bugzilla/show_bug.cgi?id=21579
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9746 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99117
https://access.redhat.com/security/cve/CVE-2017-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21580
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42199/
binutils CVE-2017-9747 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99114
https://access.redhat.com/security/cve/CVE-2017-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747
https://sourceware.org/bugzilla/show_bug.cgi?id=21581
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42200/
binutils CVE-2017-9748 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99110
https://access.redhat.com/security/cve/CVE-2017-9748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748
https://sourceware.org/bugzilla/show_bug.cgi?id=21582
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42202/
binutils CVE-2017-9749 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99113
https://access.redhat.com/security/cve/CVE-2017-9749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21586
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42201/
binutils CVE-2017-9750 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99118
https://access.redhat.com/security/cve/CVE-2017-9750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21587
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42198/
binutils CVE-2017-9751 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99111
https://access.redhat.com/security/cve/CVE-2017-9751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21588
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9752 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99122
https://access.redhat.com/security/cve/CVE-2017-9752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752
https://sourceware.org/bugzilla/show_bug.cgi?id=21589
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9753 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99116
https://access.redhat.com/security/cve/CVE-2017-9753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9754 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99125
https://access.redhat.com/security/cve/CVE-2017-9754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9755 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99124
https://access.redhat.com/security/cve/CVE-2017-9755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21594
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9756 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99103
https://access.redhat.com/security/cve/CVE-2017-9756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21595
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42204/
binutils CVE-2017-9954 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99307
https://access.redhat.com/security/cve/CVE-2017-9954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21670
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2017-9955 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/99573
https://access.redhat.com/security/cve/CVE-2017-9955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955
https://sourceware.org/bugzilla/show_bug.cgi?id=21665
binutils CVE-2018-12698 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/104539
https://access.redhat.com/security/cve/CVE-2018-12698
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12699 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/104540
https://access.redhat.com/security/cve/CVE-2018-12699
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-12934 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-12934
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17360 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17794 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-17794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-17985 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18483 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://access.redhat.com/security/cve/CVE-2018-18483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18484 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://access.redhat.com/security/cve/CVE-2018-18484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18605 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18606 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18607 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18700 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-18700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-18701 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-18701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-19932 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://access.redhat.com/security/cve/CVE-2018-19932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20002 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/106142
https://access.redhat.com/security/cve/CVE-2018-20002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2018-20657 LOW 2.27-41.base.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
binutils CVE-2018-6323 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/102821
https://access.redhat.com/security/cve/CVE-2018-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323
https://sourceware.org/bugzilla/show_bug.cgi?id=22746
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/44035/
binutils CVE-2018-6759 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103030
https://access.redhat.com/security/cve/CVE-2018-6759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22794
https://ubuntu.com/security/notices/USN-4336-2
binutils CVE-2018-6872 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103103
https://access.redhat.com/security/cve/CVE-2018-6872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22788
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
binutils CVE-2019-1010204 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
binutils CVE-2019-12972 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://access.redhat.com/security/cve/CVE-2019-12972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://nvd.nist.gov/vuln/detail/CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-14250 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-17450 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17450
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2019-17451 LOW 2.27-41.base.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17451
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
binutils CVE-2020-16591 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-16591
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
binutils CVE-2020-16593 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-16593
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
binutils CVE-2020-16599 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-16599
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
binutils CVE-2020-35448 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35448
https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
binutils CVE-2020-35493 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35493
https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35493
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35494 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35494
https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35494
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35495 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35495
https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35495
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35496 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35496
https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35496
https://security.netapp.com/advisory/ntap-20210212-0007/
binutils CVE-2020-35507 LOW 2.27-41.base.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35507
https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://nvd.nist.gov/vuln/detail/CVE-2020-35507
https://security.netapp.com/advisory/ntap-20210212-0007/
bzip2-libs CVE-2016-3189 LOW 1.0.6-13.el7
Expand...http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
http://www.openwall.com/lists/oss-security/2016/06/20/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91297
http://www.securitytracker.com/id/1036132
https://access.redhat.com/security/cve/CVE-2016-3189
https://bugzilla.redhat.com/show_bug.cgi?id=1319648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e@%3Cjira.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://marc.info/?l=oss-security&m=146642106322396&w=2
https://nvd.nist.gov/vuln/detail/CVE-2016-3189
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://security.gentoo.org/glsa/201708-08
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
bzip2-libs CVE-2019-12900 LOW 1.0.6-13.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
coreutils CVE-2016-2781 MEDIUM 8.22-24.el7
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
coreutils CVE-2017-18018 MEDIUM 8.22-24.el7
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
coreutils CVE-2014-9471 LOW 8.22-24.el7
Expand...http://advisories.mageia.org/MGASA-2015-0029.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=11;filename=date-tz-crash.patch;att=1;bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=19;filename=coreutils-date-crash.patch;att=1;bug=16872
http://secunia.com/advisories/62226
http://ubuntu.com/usn/usn-2473-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:179
http://www.openwall.com/lists/oss-security/2014/11/25/1
http://www.openwall.com/lists/oss-security/2014/11/25/4
http://www.openwall.com/lists/oss-security/2015/01/03/11
https://access.redhat.com/security/cve/CVE-2014-9471
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
https://security.gentoo.org/glsa/201612-22
https://ubuntu.com/security/notices/USN-2473-1
coreutils CVE-2015-4041 LOW 8.22-24.el7
Expand...http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4041
https://bugzilla.suse.com/show_bug.cgi?id=928749
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
coreutils CVE-2015-4042 LOW 8.22-24.el7
Expand...http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4042
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
cpio CVE-2019-14866 MEDIUM 2.11-27.el7 2.11-28.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-14866
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866
https://linux.oracle.com/cve/CVE-2019-14866.html
https://linux.oracle.com/errata/ELSA-2021-1582.html
https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
https://ubuntu.com/security/notices/USN-4176-1
cpio CVE-2021-38185 MEDIUM 2.11-27.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-38185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
https://errata.almalinux.org/8/ALSA-2022-1991.html
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
https://github.com/fangqyi/cpiopwn
https://linux.oracle.com/cve/CVE-2021-38185.html
https://linux.oracle.com/errata/ELSA-2022-1991.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38185
https://ubuntu.com/security/notices/USN-5064-1
https://ubuntu.com/security/notices/USN-5064-2
cpio CVE-2015-1197 LOW 2.11-27.el7
Expand...http://advisories.mageia.org/MGASA-2015-0080.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
http://www.openwall.com/lists/oss-security/2015/01/07/5
http://www.openwall.com/lists/oss-security/2015/01/18/7
http://www.securityfocus.com/bid/71914
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2015-1197
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
https://ubuntu.com/security/notices/USN-2906-1
cpio CVE-2016-2037 LOW 2.11-27.el7
Expand...http://www.debian.org/security/2016/dsa-3483
http://www.openwall.com/lists/oss-security/2016/01/19/4
http://www.openwall.com/lists/oss-security/2016/01/22/4
http://www.securityfocus.com/bid/82293
http://www.securitytracker.com/id/1035067
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2016-2037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
https://ubuntu.com/security/notices/USN-2906-1
cpp CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
cpp CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
cpp CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
cpp CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
cpp CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
cpp CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
cpp CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
cpp CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
cpp CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
cpp CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
cpp CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
cpp CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
cpp CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
cpp CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
cpp CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
cpp CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
cpp CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
cpp CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
cracklib CVE-2016-6318 LOW 2.9.0-11.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://security.gentoo.org/glsa/201612-25
cracklib-dicts CVE-2016-6318 LOW 2.9.0-11.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://security.gentoo.org/glsa/201612-25
curl CVE-2015-3153 MEDIUM 7.29.0-54.el7
Expand...http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
curl CVE-2016-8615 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8617 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8618 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8619 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8624 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8625 MEDIUM 7.29.0-54.el7
Expand...http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://www.tenable.com/security/tns-2016-21
curl CVE-2017-1000254 MEDIUM 7.29.0-54.el7
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
curl CVE-2017-8817 MEDIUM 7.29.0-54.el7
Expand...http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.debian.org/security/2017/dsa-4051
curl CVE-2019-5482 MEDIUM 7.29.0-54.el7 7.29.0-59.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
https://access.redhat.com/security/cve/CVE-2019-5482
https://curl.haxx.se/docs/CVE-2019-5482.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
https://linux.oracle.com/cve/CVE-2019-5482.html
https://linux.oracle.com/errata/ELSA-2020-5562.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20191004-0003/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://ubuntu.com/security/notices/USN-4129-1
https://ubuntu.com/security/notices/USN-4129-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
curl CVE-2020-8177 MEDIUM 7.29.0-54.el7 7.29.0-59.el7_9.1
Expand...https://access.redhat.com/security/cve/CVE-2020-8177
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8177.html
https://curl.se/docs/CVE-2020-8177.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
https://hackerone.com/reports/887462
https://linux.oracle.com/cve/CVE-2020-8177.html
https://linux.oracle.com/errata/ELSA-2020-5002.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8177
https://ubuntu.com/security/notices/USN-4402-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2020-8284 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2020-8285 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2021-22876 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
curl CVE-2021-22924 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22946 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22947 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-27774 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27778 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27778
https://hackerone.com/reports/1553598
https://nvd.nist.gov/vuln/detail/CVE-2022-27778
https://security.netapp.com/advisory/ntap-20220609-0009/
curl CVE-2022-27779 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27779
https://hackerone.com/reports/1553301
https://nvd.nist.gov/vuln/detail/CVE-2022-27779
https://security.netapp.com/advisory/ntap-20220609-0009/
curl CVE-2022-27780 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://hackerone.com/reports/1553841
https://nvd.nist.gov/vuln/detail/CVE-2022-27780
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2022-27782 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2022-30115 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-30115
https://hackerone.com/reports/1557449
https://nvd.nist.gov/vuln/detail/CVE-2022-30115
https://security.netapp.com/advisory/ntap-20220609-0009/
curl CVE-2016-0755 LOW 7.29.0-54.el7
Expand...http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
curl CVE-2016-8616 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8621 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8622 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-8623 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
curl CVE-2016-9586 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
curl CVE-2017-1000100 LOW 7.29.0-54.el7
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
curl CVE-2017-7407 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
curl CVE-2018-20483 LOW 7.29.0-54.el7
Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
curl CVE-2019-5436 LOW 7.29.0-54.el7 7.29.0-57.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/11/6
https://access.redhat.com/security/cve/CVE-2019-5436
https://curl.haxx.se/docs/CVE-2019-5436.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
https://linux.oracle.com/cve/CVE-2019-5436.html
https://linux.oracle.com/errata/ELSA-2020-1792.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20190606-0004/
https://support.f5.com/csp/article/K55133295
https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3993-1
https://ubuntu.com/security/notices/USN-3993-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
curl CVE-2020-8231 LOW 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
curl CVE-2021-22898 LOW 7.29.0-54.el7
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2021-22925 LOW 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-27781 LOW 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
cyrus-sasl-lib CVE-2022-24407 HIGH 2.1.26-23.el7 2.1.26-24.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
cyrus-sasl-lib CVE-2019-19906 MEDIUM 2.1.26-23.el7
Expand...http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2019-19906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
https://github.com/cyrusimap/cyrus-sasl/issues/587
https://linux.oracle.com/cve/CVE-2019-19906.html
https://linux.oracle.com/errata/ELSA-2020-4497.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
https://nvd.nist.gov/vuln/detail/CVE-2019-19906
https://seclists.org/bugtraq/2019/Dec/42
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4256-1
https://usn.ubuntu.com/4256-1/
https://www.debian.org/security/2019/dsa-4591
https://www.openldap.org/its/index.cgi/Incoming?id=9123
dbus CVE-2020-12049 HIGH 1:1.10.24-13.el7_6 1:1.10.24-14.el7_8
Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3
https://access.redhat.com/security/cve/CVE-2020-12049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
https://linux.oracle.com/cve/CVE-2020-12049.html
https://linux.oracle.com/errata/ELSA-2020-3014.html
https://security.gentoo.org/glsa/202007-46
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
https://ubuntu.com/security/notices/USN-4398-1
https://ubuntu.com/security/notices/USN-4398-2
https://usn.ubuntu.com/4398-1/
https://usn.ubuntu.com/4398-2/
dbus CVE-2014-3477 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
dbus CVE-2014-3532 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
dbus CVE-2014-3533 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
dbus CVE-2014-3635 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3635
https://bugs.freedesktop.org/show_bug.cgi?id=83622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
https://ubuntu.com/security/notices/USN-2352-1
dbus CVE-2019-12749 MEDIUM 1:1.10.24-13.el7_6 1:1.10.24-15.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
http://www.openwall.com/lists/oss-security/2019/06/11/2
http://www.securityfocus.com/bid/108751
https://access.redhat.com/errata/RHSA-2019:1726
https://access.redhat.com/errata/RHSA-2019:2868
https://access.redhat.com/errata/RHSA-2019:2870
https://access.redhat.com/errata/RHSA-2019:3707
https://access.redhat.com/security/cve/CVE-2019-12749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
https://linux.oracle.com/cve/CVE-2019-12749.html
https://linux.oracle.com/errata/ELSA-2020-4032.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
https://nvd.nist.gov/vuln/detail/CVE-2019-12749
https://seclists.org/bugtraq/2019/Jun/16
https://security.gentoo.org/glsa/201909-08
https://ubuntu.com/security/notices/USN-4015-1
https://ubuntu.com/security/notices/USN-4015-2
https://usn.ubuntu.com/4015-1/
https://usn.ubuntu.com/4015-2/
https://www.debian.org/security/2019/dsa-4462
https://www.openwall.com/lists/oss-security/2019/06/11/2
dbus CVE-2014-3636 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
dbus CVE-2014-3637 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
dbus CVE-2014-3638 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
dbus CVE-2014-3639 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
dbus CVE-2015-0245 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
dbus CVE-2020-35512 LOW 1:1.10.24-13.el7_6
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
dbus-libs CVE-2020-12049 HIGH 1:1.10.24-13.el7_6 1:1.10.24-14.el7_8
Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3
https://access.redhat.com/security/cve/CVE-2020-12049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049
https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18
https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16
https://linux.oracle.com/cve/CVE-2020-12049.html
https://linux.oracle.com/errata/ELSA-2020-3014.html
https://security.gentoo.org/glsa/202007-46
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
https://ubuntu.com/security/notices/USN-4398-1
https://ubuntu.com/security/notices/USN-4398-2
https://usn.ubuntu.com/4398-1/
https://usn.ubuntu.com/4398-2/
dbus-libs CVE-2014-3477 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
dbus-libs CVE-2014-3532 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
dbus-libs CVE-2014-3533 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
dbus-libs CVE-2014-3635 MEDIUM 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3635
https://bugs.freedesktop.org/show_bug.cgi?id=83622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635
https://ubuntu.com/security/notices/USN-2352-1
dbus-libs CVE-2019-12749 MEDIUM 1:1.10.24-13.el7_6 1:1.10.24-15.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html
http://www.openwall.com/lists/oss-security/2019/06/11/2
http://www.securityfocus.com/bid/108751
https://access.redhat.com/errata/RHSA-2019:1726
https://access.redhat.com/errata/RHSA-2019:2868
https://access.redhat.com/errata/RHSA-2019:2870
https://access.redhat.com/errata/RHSA-2019:3707
https://access.redhat.com/security/cve/CVE-2019-12749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749
https://linux.oracle.com/cve/CVE-2019-12749.html
https://linux.oracle.com/errata/ELSA-2020-4032.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/
https://nvd.nist.gov/vuln/detail/CVE-2019-12749
https://seclists.org/bugtraq/2019/Jun/16
https://security.gentoo.org/glsa/201909-08
https://ubuntu.com/security/notices/USN-4015-1
https://ubuntu.com/security/notices/USN-4015-2
https://usn.ubuntu.com/4015-1/
https://usn.ubuntu.com/4015-2/
https://www.debian.org/security/2019/dsa-4462
https://www.openwall.com/lists/oss-security/2019/06/11/2
dbus-libs CVE-2014-3636 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
dbus-libs CVE-2014-3637 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
dbus-libs CVE-2014-3638 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
dbus-libs CVE-2014-3639 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
dbus-libs CVE-2015-0245 LOW 1:1.10.24-13.el7_6
Expand...http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
dbus-libs CVE-2020-35512 LOW 1:1.10.24-13.el7_6
Expand...https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
device-mapper CVE-2020-8991 LOW 7:1.02.158-2.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
device-mapper-libs CVE-2020-8991 LOW 7:1.02.158-2.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
dracut CVE-2016-4484 MEDIUM 033-564.el7
Expand...http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html
http://www.openwall.com/lists/oss-security/2016/11/14/13
http://www.openwall.com/lists/oss-security/2016/11/15/1
http://www.openwall.com/lists/oss-security/2016/11/15/4
http://www.openwall.com/lists/oss-security/2016/11/16/6
http://www.securityfocus.com/bid/94315
https://access.redhat.com/articles/2786581
https://access.redhat.com/security/cve/CVE-2016-4484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484
https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb
elfutils-default-yama-scope CVE-2016-10254 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2016-10255 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7607 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7608 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7609 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7610 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7611 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7612 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-default-yama-scope CVE-2017-7613 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2016-10254 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2016-10255 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7607 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7608 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7609 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7610 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7611 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7612 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libelf CVE-2017-7613 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2016-10254 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2016-10255 LOW 0.176-2.el7
Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7607 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7608 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7609 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7610 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7611 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7612 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
elfutils-libs CVE-2017-7613 LOW 0.176-2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
expat CVE-2022-25235 HIGH 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25235
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
expat CVE-2022-25236 HIGH 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25236
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
expat CVE-2022-25315 HIGH 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25315
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25315
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
expat CVE-2012-6702 MEDIUM 2.1.0-10.el7_3
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/03/8
http://www.openwall.com/lists/oss-security/2016/06/04/1
http://www.securityfocus.com/bid/91483
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2012-6702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
expat CVE-2013-0340 MEDIUM 2.1.0-10.el7_3
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
expat CVE-2015-2716 MEDIUM 2.1.0-10.el7_3 2.1.0-11.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html
http://rhn.redhat.com/errata/RHSA-2015-0988.html
http://rhn.redhat.com/errata/RHSA-2015-1012.html
http://www.debian.org/security/2015/dsa-3260
http://www.debian.org/security/2015/dsa-3264
http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/74611
http://www.ubuntu.com/usn/USN-2602-1
http://www.ubuntu.com/usn/USN-2603-1
https://access.redhat.com/security/cve/CVE-2015-2716
https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716
https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2015-2716.html
https://linux.oracle.com/errata/ELSA-2020-1011.html
https://security.gentoo.org/glsa/201605-06
https://ubuntu.com/security/notices/USN-2602-1
https://ubuntu.com/security/notices/USN-2603-1
https://www.mozilla.org/en-US/security/advisories/mfsa2015-54/
https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
https://www.tenable.com/security/tns-2016-20
expat CVE-2016-4472 MEDIUM 2.1.0-10.el7_3
Expand...http://www.securityfocus.com/bid/91528
http://www.ubuntu.com/usn/USN-3013-1
https://access.redhat.com/security/cve/CVE-2016-4472
https://bugzilla.redhat.com/show_bug.cgi?id=1344251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://security.gentoo.org/glsa/201701-21
https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
expat CVE-2016-5300 MEDIUM 2.1.0-10.el7_3
Expand...http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/04/4
http://www.openwall.com/lists/oss-security/2016/06/04/5
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91159
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.tenable.com/security/tns-2016-20
expat CVE-2017-9233 MEDIUM 2.1.0-10.el7_3
Expand...http://www.debian.org/security/2017/dsa-3898
http://www.openwall.com/lists/oss-security/2017/06/17/7
http://www.securityfocus.com/bid/99276
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-9233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
https://github.com/libexpat/libexpat/blob/master/expat/Changes
https://libexpat.github.io/doc/cve-2017-9233/
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://support.f5.com/csp/article/K03244804
https://ubuntu.com/security/notices/USN-3356-1
https://ubuntu.com/security/notices/USN-3356-2
expat CVE-2018-20843 MEDIUM 2.1.0-10.el7_3 2.1.0-12.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html
https://access.redhat.com/security/cve/CVE-2018-20843
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843
https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes
https://github.com/libexpat/libexpat/issues/186
https://github.com/libexpat/libexpat/pull/262
https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
https://linux.oracle.com/cve/CVE-2018-20843.html
https://linux.oracle.com/errata/ELSA-2020-4484.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/
https://nvd.nist.gov/vuln/detail/CVE-2018-20843
https://seclists.org/bugtraq/2019/Jun/39
https://security.gentoo.org/glsa/201911-08
https://security.netapp.com/advisory/ntap-20190703-0001/
https://support.f5.com/csp/article/K51011533
https://ubuntu.com/security/notices/USN-4040-1
https://ubuntu.com/security/notices/USN-4040-2
https://usn.ubuntu.com/4040-1/
https://usn.ubuntu.com/4040-2/
https://www.debian.org/security/2019/dsa-4472
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-11
expat CVE-2021-45960 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-45960
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45960
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2021-46143 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-46143
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46143
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22822 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22822
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22822
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22823 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22823
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22823
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22824 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22824
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22824
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22825 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22825
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22825
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22826 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22826
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22826
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-22827 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22827
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22827
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-23852 MEDIUM 2.1.0-10.el7_3 2.1.0-14.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2022-23852
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23852
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
expat CVE-2022-25313 MEDIUM 2.1.0-10.el7_3
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
expat CVE-2016-9063 LOW 2.1.0-10.el7_3
Expand...http://www.securityfocus.com/bid/94337
http://www.securitytracker.com/id/1037298
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2016-9063
https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
https://ubuntu.com/security/notices/USN-3124-1
https://www.debian.org/security/2017/dsa-3898
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://www.mozilla.org/security/advisories/mfsa2016-89/
expat CVE-2019-15903 LOW 2.1.0-10.el7_3 2.1.0-12.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
http://seclists.org/fulldisclosure/2019/Dec/23
http://seclists.org/fulldisclosure/2019/Dec/26
http://seclists.org/fulldisclosure/2019/Dec/27
http://seclists.org/fulldisclosure/2019/Dec/30
https://access.redhat.com/errata/RHSA-2019:3210
https://access.redhat.com/errata/RHSA-2019:3237
https://access.redhat.com/errata/RHSA-2019:3756
https://access.redhat.com/security/cve/CVE-2019-15903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
https://github.com/libexpat/libexpat/issues/317
https://github.com/libexpat/libexpat/issues/342
https://github.com/libexpat/libexpat/pull/318
https://linux.oracle.com/cve/CVE-2019-15903.html
https://linux.oracle.com/errata/ELSA-2020-4484.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
https://nvd.nist.gov/vuln/detail/CVE-2019-15903
https://seclists.org/bugtraq/2019/Dec/17
https://seclists.org/bugtraq/2019/Dec/21
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Nov/1
https://seclists.org/bugtraq/2019/Nov/24
https://seclists.org/bugtraq/2019/Oct/29
https://seclists.org/bugtraq/2019/Sep/30
https://seclists.org/bugtraq/2019/Sep/37
https://security.gentoo.org/glsa/201911-08
https://security.netapp.com/advisory/ntap-20190926-0004/
https://support.apple.com/kb/HT210785
https://support.apple.com/kb/HT210788
https://support.apple.com/kb/HT210789
https://support.apple.com/kb/HT210790
https://support.apple.com/kb/HT210793
https://support.apple.com/kb/HT210794
https://support.apple.com/kb/HT210795
https://ubuntu.com/security/notices/USN-4132-1
https://ubuntu.com/security/notices/USN-4132-2
https://ubuntu.com/security/notices/USN-4165-1
https://ubuntu.com/security/notices/USN-4202-1
https://ubuntu.com/security/notices/USN-4335-1
https://usn.ubuntu.com/4132-1/
https://usn.ubuntu.com/4132-2/
https://usn.ubuntu.com/4165-1/
https://usn.ubuntu.com/4202-1/
https://usn.ubuntu.com/4335-1/
https://www.debian.org/security/2019/dsa-4530
https://www.debian.org/security/2019/dsa-4549
https://www.debian.org/security/2019/dsa-4571
https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/security/tns-2021-11
expat CVE-2022-23990 LOW 2.1.0-10.el7_3
Expand...https://access.redhat.com/security/cve/CVE-2022-23990
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
file CVE-2014-9620 LOW 5.11-36.el7
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
file CVE-2015-8865 LOW 5.11-36.el7
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
file-libs CVE-2014-9620 LOW 5.11-36.el7
Expand...http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
file-libs CVE-2015-8865 LOW 5.11-36.el7
Expand...http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
flex CVE-2016-6354 MEDIUM 2.5.37-6.el7
Expand...http://seclists.org/oss-sec/2016/q3/97
http://www.debian.org/security/2016/dsa-3653
http://www.openwall.com/lists/oss-security/2016/07/18/8
http://www.openwall.com/lists/oss-security/2016/07/26/12
https://access.redhat.com/security/cve/CVE-2016-6354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354
https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466
https://security.gentoo.org/glsa/201701-31
flex CVE-2019-6293 LOW 2.5.37-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6293
https://github.com/westes/flex/issues/414
https://nvd.nist.gov/vuln/detail/CVE-2019-6293
freetype CVE-2016-10244 MEDIUM 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/97405
http://www.securitytracker.com/id/1038090
http://www.securitytracker.com/id/1038201
https://access.redhat.com/security/cve/CVE-2016-10244
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
https://security.gentoo.org/glsa/201706-14
https://source.android.com/security/bulletin/2017-04-01
https://ubuntu.com/security/notices/USN-3237-1
https://www.oracle.com/security-alerts/cpuapr2020.html
freetype CVE-2017-8105 MEDIUM 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99093
https://access.redhat.com/security/cve/CVE-2017-8105
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
freetype CVE-2017-8287 MEDIUM 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99091
https://access.redhat.com/security/cve/CVE-2017-8287
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
freetype CVE-2022-27404 MEDIUM 2.8-14.el7_9.1
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
freetype CVE-2022-27405 MEDIUM 2.8-14.el7_9.1
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
freetype CVE-2022-27406 MEDIUM 2.8-14.el7_9.1
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
https://ubuntu.com/security/notices/USN-5453-1
freetype CVE-2014-9745 LOW 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html
http://savannah.nongnu.org/bugs/index.php?41590
http://www.debian.org/security/2015/dsa-3370
http://www.securityfocus.com/bid/76727
http://www.securitytracker.com/id/1033536
http://www.ubuntu.com/usn/USN-2739-1
https://access.redhat.com/security/cve/CVE-2014-9745
https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124
https://code.google.com/p/chromium/issues/detail?id=459050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
https://ubuntu.com/security/notices/USN-2739-1
freetype CVE-2014-9746 LOW 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25/4
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://access.redhat.com/security/cve/CVE-2014-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
freetype CVE-2014-9747 LOW 2.8-14.el7_9.1
Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25
http://www.openwall.com/lists/oss-security/2015/09/25/4
https://access.redhat.com/security/cve/CVE-2014-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
freetype CVE-2018-6942 LOW 2.8-14.el7_9.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html
https://access.redhat.com/security/cve/CVE-2018-6942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
https://ubuntu.com/security/notices/USN-3572-1
https://usn.ubuntu.com/3572-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
gcc CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
gcc CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
gcc CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
gcc CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
gcc CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
gcc CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
gcc CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
gcc CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
gcc CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
gcc CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
gcc CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
gcc CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
gcc CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
gcc CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
gcc CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
gcc CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
gcc CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
gcc-c++ CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
gcc-c++ CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
gcc-c++ CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
gcc-c++ CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
gcc-c++ CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
gcc-c++ CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
gcc-c++ CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
gcc-c++ CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
gcc-c++ CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
gcc-c++ CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
gcc-c++ CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
gcc-c++ CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
gcc-c++ CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
gcc-c++ CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
gcc-c++ CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
gcc-c++ CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
gcc-c++ CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
gcc-c++ CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
git CVE-2017-14867 MEDIUM 1.8.3.1-23.el7_8
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
git CVE-2018-1000021 MEDIUM 1.8.3.1-23.el7_8
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
git CVE-2019-1348 MEDIUM 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348
https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1348.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://support.apple.com/kb/HT210729
https://ubuntu.com/security/notices/USN-4220-1
git CVE-2019-1349 MEDIUM 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349
https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1349.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
git CVE-2021-21300 MEDIUM 1.8.3.1-23.el7_8
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
git CVE-2021-40330 MEDIUM 1.8.3.1-23.el7_8
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
git CVE-2022-24765 MEDIUM 1.8.3.1-23.el7_8
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
git CVE-2017-15298 LOW 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
glib2 CVE-2015-8385 HIGH 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85572
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8385
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385
https://linux.oracle.com/cve/CVE-2015-8385.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2016-3191 HIGH 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://vcs.pcre.org/pcre2?view=revision&revision=489
http://vcs.pcre.org/pcre?view=revision&revision=1631
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84810
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2016-3191
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.debian.org/815920
https://bugs.debian.org/815921
https://bugs.exim.org/show_bug.cgi?id=1791
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191
https://linux.oracle.com/cve/CVE-2016-3191.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
https://www.tenable.com/security/tns-2016-18
glib2 CVE-2021-27219 HIGH 2.56.1-8.el7 2.56.1-9.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27219.json
https://access.redhat.com/security/cve/CVE-2021-27219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
https://gitlab.gnome.org/GNOME/glib/-/issues/2319
https://linux.oracle.com/cve/CVE-2021-27219.html
https://linux.oracle.com/errata/ELSA-2021-9318.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27219
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
glib2 CVE-2015-2327 MEDIUM 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.fortiguard.com/advisory/FG-VD-15-010/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2327
https://bugs.exim.org/show_bug.cgi?id=1503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327
https://jira.mongodb.org/browse/SERVER-17252
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2015-2328 MEDIUM 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.fortiguard.com/advisory/FG-VD-15-014/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2328
https://bugs.exim.org/show_bug.cgi?id=1515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328
https://jira.mongodb.org/browse/SERVER-17252
https://linux.oracle.com/cve/CVE-2015-2328.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2015-3217 MEDIUM 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre?view=revision&revision=1566
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/03/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75018
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-3217
https://bugs.exim.org/show_bug.cgi?id=1638
https://bugzilla.redhat.com/show_bug.cgi?id=1228283
https://linux.oracle.com/cve/CVE-2015-3217.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
glib2 CVE-2015-5073 MEDIUM 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup
http://vcs.pcre.org/pcre?view=revision&revision=1571
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/26/1
http://www.openwall.com/lists/oss-security/2015/06/26/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75430
http://www.securitytracker.com/id/1033154
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-5073
https://bugs.exim.org/show_bug.cgi?id=1651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073
https://linux.oracle.com/cve/CVE-2015-5073.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2694-1
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2015-8388 MEDIUM 2.56.1-8.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85576
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8388
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388
https://linux.oracle.com/cve/CVE-2015-8388.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2015-8391 MEDIUM 2.56.1-8.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8391
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8391.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2021-27218 MEDIUM 2.56.1-8.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27218.json
https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
glib2 CVE-2021-3800 MEDIUM 2.56.1-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
https://linux.oracle.com/cve/CVE-2021-3800.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://ubuntu.com/security/notices/USN-5189-1
https://www.openwall.com/lists/oss-security/2017/06/23/8
glib2 CVE-2015-8386 LOW 2.56.1-8.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8386
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8386.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
glib2 CVE-2017-11164 LOW 2.56.1-8.el7
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
glib2 CVE-2017-7244 LOW 2.56.1-8.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
glib2 CVE-2017-7245 LOW 2.56.1-8.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
glib2 CVE-2017-7246 LOW 2.56.1-8.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
glib2 CVE-2018-16428 LOW 2.56.1-8.el7
Expand...http://www.openwall.com/lists/oss-security/2020/02/14/3
http://www.securityfocus.com/bid/105210
https://access.redhat.com/security/cve/CVE-2018-16428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9
https://gitlab.gnome.org/GNOME/glib/issues/1364
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
glib2 CVE-2018-16429 LOW 2.56.1-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-16429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
https://gitlab.gnome.org/GNOME/glib/issues/1361
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
glib2 CVE-2019-13012 LOW 2.56.1-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html
https://access.redhat.com/security/cve/CVE-2019-13012
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012
https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
https://gitlab.gnome.org/GNOME/glib/issues/1658
https://gitlab.gnome.org/GNOME/glib/merge_requests/450
https://linux.oracle.com/cve/CVE-2019-13012.html
https://linux.oracle.com/errata/ELSA-2021-1586.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13012
https://security.netapp.com/advisory/ntap-20190806-0003/
https://ubuntu.com/security/notices/USN-4049-1
https://ubuntu.com/security/notices/USN-4049-2
https://ubuntu.com/security/notices/USN-4049-3
https://ubuntu.com/security/notices/USN-4049-4
https://usn.ubuntu.com/4049-1/
https://usn.ubuntu.com/4049-2/
glib2 CVE-2021-28153 LOW 2.56.1-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
glibc CVE-2009-5155 MEDIUM 2.17-292.el7
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
glibc CVE-2015-8983 MEDIUM 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc CVE-2016-1234 MEDIUM 2.17-292.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
glibc CVE-2016-4429 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
glibc CVE-2017-8804 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
glibc CVE-2019-25013 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc CVE-2019-9169 MEDIUM 2.17-292.el7
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc CVE-2020-10029 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc CVE-2020-1752 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc CVE-2020-29573 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
glibc CVE-2021-35942 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
glibc CVE-2021-3999 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
glibc CVE-2022-23218 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc CVE-2022-23219 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc CVE-2014-4043 LOW 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
glibc CVE-2015-8982 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
glibc CVE-2015-8984 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc CVE-2015-8985 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
glibc CVE-2016-10228 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc CVE-2017-15671 LOW 2.17-292.el7
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
glibc CVE-2019-19126 LOW 2.17-292.el7 2.17-317.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc CVE-2020-27618 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
glibc CVE-2021-33574 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
glibc-common CVE-2009-5155 MEDIUM 2.17-292.el7
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
glibc-common CVE-2015-8983 MEDIUM 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-common CVE-2016-1234 MEDIUM 2.17-292.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
glibc-common CVE-2016-4429 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
glibc-common CVE-2017-8804 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
glibc-common CVE-2019-25013 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-common CVE-2019-9169 MEDIUM 2.17-292.el7
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-common CVE-2020-10029 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-common CVE-2020-1752 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-common CVE-2020-29573 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
glibc-common CVE-2021-35942 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
glibc-common CVE-2021-3999 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
glibc-common CVE-2022-23218 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-common CVE-2022-23219 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-common CVE-2014-4043 LOW 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
glibc-common CVE-2015-8982 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
glibc-common CVE-2015-8984 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-common CVE-2015-8985 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
glibc-common CVE-2016-10228 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-common CVE-2017-15671 LOW 2.17-292.el7
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
glibc-common CVE-2019-19126 LOW 2.17-292.el7 2.17-317.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-common CVE-2020-27618 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
glibc-common CVE-2021-33574 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
glibc-devel CVE-2009-5155 MEDIUM 2.17-292.el7
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
glibc-devel CVE-2015-8983 MEDIUM 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-devel CVE-2016-1234 MEDIUM 2.17-292.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
glibc-devel CVE-2016-4429 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
glibc-devel CVE-2017-8804 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
glibc-devel CVE-2019-25013 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-devel CVE-2019-9169 MEDIUM 2.17-292.el7
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-devel CVE-2020-10029 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-devel CVE-2020-1752 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-devel CVE-2020-29573 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
glibc-devel CVE-2021-35942 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
glibc-devel CVE-2021-3999 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
glibc-devel CVE-2022-23218 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-devel CVE-2022-23219 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-devel CVE-2014-4043 LOW 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
glibc-devel CVE-2015-8982 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
glibc-devel CVE-2015-8984 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-devel CVE-2015-8985 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
glibc-devel CVE-2016-10228 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-devel CVE-2017-15671 LOW 2.17-292.el7
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
glibc-devel CVE-2019-19126 LOW 2.17-292.el7 2.17-317.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-devel CVE-2020-27618 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
glibc-devel CVE-2021-33574 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
glibc-headers CVE-2009-5155 MEDIUM 2.17-292.el7
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
glibc-headers CVE-2015-8983 MEDIUM 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-headers CVE-2016-1234 MEDIUM 2.17-292.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
glibc-headers CVE-2016-4429 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
glibc-headers CVE-2017-8804 MEDIUM 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
glibc-headers CVE-2019-25013 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-headers CVE-2019-9169 MEDIUM 2.17-292.el7
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-headers CVE-2020-10029 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-headers CVE-2020-1752 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-headers CVE-2020-29573 MEDIUM 2.17-292.el7 2.17-322.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-29573
https://linux.oracle.com/cve/CVE-2020-29573.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26649
https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
glibc-headers CVE-2021-35942 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
glibc-headers CVE-2021-3999 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
glibc-headers CVE-2022-23218 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-headers CVE-2022-23219 MEDIUM 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
glibc-headers CVE-2014-4043 LOW 2.17-292.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
glibc-headers CVE-2015-8982 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
glibc-headers CVE-2015-8984 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
glibc-headers CVE-2015-8985 LOW 2.17-292.el7
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
glibc-headers CVE-2016-10228 LOW 2.17-292.el7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
glibc-headers CVE-2017-15671 LOW 2.17-292.el7
Expand...http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
glibc-headers CVE-2019-19126 LOW 2.17-292.el7 2.17-317.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
glibc-headers CVE-2020-27618 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
glibc-headers CVE-2021-33574 LOW 2.17-292.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
gmp CVE-2021-43618 LOW 1:6.0.0-15.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
gnupg2 CVE-2014-4617 MEDIUM 2.0.22-5.el7_5
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html
http://secunia.com/advisories/59213
http://secunia.com/advisories/59351
http://secunia.com/advisories/59534
http://secunia.com/advisories/59578
http://www.debian.org/security/2014/dsa-2967
http://www.debian.org/security/2014/dsa-2968
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.ubuntu.com/usn/USN-2258-1
https://access.redhat.com/security/cve/CVE-2014-4617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
https://ubuntu.com/security/notices/USN-2258-1
gnupg2 CVE-2019-13050 MEDIUM 2.0.22-5.el7_5
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
https://ubuntu.com/security/notices/USN-5431-1
gnupg2 CVE-2014-3591 LOW 2.0.22-5.el7_5
Expand...http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
gnupg2 CVE-2015-0837 LOW 2.0.22-5.el7_5
Expand...http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
gnupg2 CVE-2015-1606 LOW 2.0.22-5.el7_5
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
http://www.debian.org/security/2015/dsa-3184
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securitytracker.com/id/1031876
https://access.redhat.com/security/cve/CVE-2015-1606
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606
https://ubuntu.com/security/notices/USN-2554-1
gnupg2 CVE-2015-1607 LOW 2.0.22-5.el7_5
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securityfocus.com/bid/72610
http://www.ubuntu.com/usn/usn-2554-1/
https://access.redhat.com/security/cve/CVE-2015-1607
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://ubuntu.com/security/notices/USN-2554-1
gnupg2 CVE-2018-9234 LOW 2.0.22-5.el7_5
Expand...https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
gpgme CVE-2014-3564 LOW 1.3.2-5.el7
Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://seclists.org/oss-sec/2014/q3/266
http://www.debian.org/security/2014/dsa-3005
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.osvdb.org/109699
http://www.securityfocus.com/bid/68990
https://access.redhat.com/security/cve/CVE-2014-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1113267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564
https://ubuntu.com/security/notices/USN-2307-1
gzip CVE-2022-1271 HIGH 1.5-10.el7 1.5-11.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-5052.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
json-c CVE-2020-12762 MEDIUM 0.11-4.el7_0
Expand...https://access.redhat.com/security/cve/CVE-2020-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762
https://github.com/json-c/json-c/pull/592
https://github.com/rsyslog/libfastjson/issues/161
https://linux.oracle.com/cve/CVE-2020-12762.html
https://linux.oracle.com/errata/ELSA-2021-4382.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
https://nvd.nist.gov/vuln/detail/CVE-2020-12762
https://security.gentoo.org/glsa/202006-13
https://security.netapp.com/advisory/ntap-20210521-0001/
https://ubuntu.com/security/notices/USN-4360-1
https://ubuntu.com/security/notices/USN-4360-4
https://usn.ubuntu.com/4360-1/
https://usn.ubuntu.com/4360-4/
https://www.debian.org/security/2020/dsa-4741
kernel-headers CVE-2016-8666 HIGH 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fac8e0f579695a3ecbc4d3cac369139d7f819971
http://rhn.redhat.com/errata/RHSA-2016-2047.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2017-0004.html
http://www.openwall.com/lists/oss-security/2016/10/13/11
http://www.openwall.com/lists/oss-security/2016/10/14/3
http://www.securityfocus.com/bid/93562
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/CVE-2016-8666
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384991
https://bugzilla.suse.com/show_bug.cgi?id=1001486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666
https://github.com/torvalds/linux/commit/fac8e0f579695a3ecbc4d3cac369139d7f819971
https://linux.oracle.com/cve/CVE-2016-8666.html
https://linux.oracle.com/errata/ELSA-2017-3508.html
kernel-headers CVE-2017-1000112 HIGH 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2017/q3/277
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100262
http://www.securitytracker.com/id/1039162
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2019:1931
https://access.redhat.com/errata/RHSA-2019:1932
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/security/cve/CVE-2017-1000112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
https://linux.oracle.com/cve/CVE-2017-1000112.html
https://linux.oracle.com/errata/ELSA-2017-3631.html
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
https://www.exploit-db.com/exploits/45147/
kernel-headers CVE-2017-1000251 HIGH 3.10.0-1062.7.1.el7
Expand...http://nvidia.custhelp.com/app/answers/detail/a_id/4561
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100809
http://www.securitytracker.com/id/1039373
https://access.redhat.com/blogs/product-security/posts/blueborne
https://access.redhat.com/errata/RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2732
https://access.redhat.com/security/cve/CVE-2017-1000251
https://access.redhat.com/security/vulnerabilities/blueborne
https://access.redhat.com/solutions/3177231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://linux.oracle.com/cve/CVE-2017-1000251.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://ubuntu.com/security/notices/USN-3423-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BlueBorne
https://www.armis.com/blueborne
https://www.armis.com/blueborne/
https://www.exploit-db.com/exploits/42762/
https://www.kb.cert.org/vuls/id/240311
https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne
kernel-headers CVE-2017-15649 HIGH 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
http://patchwork.ozlabs.org/patch/813945/
http://patchwork.ozlabs.org/patch/818726/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
http://www.securityfocus.com/bid/101573
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0181
https://access.redhat.com/security/cve/CVE-2017-15649
https://blogs.securiteam.com/index.php/archives/3484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
https://linux.oracle.com/cve/CVE-2017-15649.html
https://linux.oracle.com/errata/ELSA-2018-0151.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-18595 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.8.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
https://access.redhat.com/security/cve/CVE-2017-18595
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595
https://git.kernel.org/linus/4397f04575c44e1440ec2e49b6302785c95fd2f8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
https://linux.oracle.com/cve/CVE-2017-18595.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
kernel-headers CVE-2017-7533 HIGH 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e
http://openwall.com/lists/oss-security/2017/08/03/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.securityfocus.com/bid/100123
http://www.securitytracker.com/id/1039075
https://access.redhat.com/errata/RHSA-2017:2473
https://access.redhat.com/errata/RHSA-2017:2585
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2770
https://access.redhat.com/errata/RHSA-2017:2869
https://access.redhat.com/security/cve/CVE-2017-7533
https://bugzilla.redhat.com/show_bug.cgi?id=1468283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
https://linux.oracle.com/cve/CVE-2017-7533.html
https://linux.oracle.com/errata/ELSA-2017-3605.html
https://patchwork.kernel.org/patch/9755753/
https://patchwork.kernel.org/patch/9755757/
https://source.android.com/security/bulletin/2017-12-01
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1408967.html
kernel-headers CVE-2017-8797 HIGH 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
http://www.openwall.com/lists/oss-security/2017/06/27/5
http://www.securityfocus.com/bid/99298
http://www.securitytracker.com/id/1038790
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2437
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/security/cve/CVE-2017-8797
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797
https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5
https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79
https://linux.oracle.com/cve/CVE-2017-8797.html
https://linux.oracle.com/errata/ELSA-2017-1842.html
kernel-headers CVE-2018-20976 HIGH 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0178
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/security/cve/CVE-2018-20976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976
https://git.kernel.org/linus/c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K10269585?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4144-1
https://ubuntu.com/security/notices/USN-4145-1
https://usn.ubuntu.com/4144-1/
https://usn.ubuntu.com/4145-1/
kernel-headers CVE-2019-11487 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.18.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.openwall.com/lists/oss-security/2019/04/29/1
http://www.securityfocus.com/bid/108054
https://access.redhat.com/errata/RHSA-2019:2703
https://access.redhat.com/errata/RHSA-2019:2741
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-11487
https://bugs.chromium.org/p/project-zero/issues/detail?id=1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b3a707736301c2128ca85ce85fb13f60b5e350a
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=88b1a17dfc3ed7728316478fae0f5ad508f50397
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8fde12ca79aff9b5ba951fce1a2641901b8d8e64
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a
https://github.com/torvalds/linux/commit/88b1a17dfc3ed7728316478fae0f5ad508f50397
https://github.com/torvalds/linux/commit/8fde12ca79aff9b5ba951fce1a2641901b8d8e64
https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://linux.oracle.com/cve/CVE-2019-11487.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lwn.net/Articles/786044/
https://security.netapp.com/advisory/ntap-20190517-0005/
https://support.f5.com/csp/article/K14255532
https://ubuntu.com/security/notices/USN-4069-1
https://ubuntu.com/security/notices/USN-4069-2
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://usn.ubuntu.com/4069-1/
https://usn.ubuntu.com/4069-2/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-14816 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.12.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/28/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/security/cve/CVE-2019-14816
https://access.redhat.com/security/cve/cve-2019-14816
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3
https://linux.oracle.com/cve/CVE-2019-14816.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.openwall.com/lists/oss-security/2019/08/28/1
kernel-headers CVE-2019-14895 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.12.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/security/cve/CVE-2019-14895
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
https://linux.oracle.com/cve/CVE-2019-14895.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
https://seclists.org/oss-sec/2019/q4/95
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
https://www.openwall.com/lists/oss-security/2019/11/22/2
kernel-headers CVE-2019-14901 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.12.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/errata/RHSA-2020:0204
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/security/cve/CVE-2019-14901
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
https://linux.oracle.com/cve/CVE-2019-14901.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
https://lore.kernel.org/linux-wireless/20191129101054.2756-1-wangqize888888888@gmail.com/
https://patchwork.kernel.org/patch/11257535/
https://seclists.org/oss-sec/2019/q4/96
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
kernel-headers CVE-2019-17133 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.12.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0374
https://access.redhat.com/errata/RHSA-2020:0375
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0653
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0664
https://access.redhat.com/errata/RHSA-2020:0790
https://access.redhat.com/security/cve/CVE-2019-17133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133
https://linux.oracle.com/cve/CVE-2019-17133.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://marc.info/?l=linux-wireless&m=157018270915487&w=2
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4211-1
https://ubuntu.com/security/notices/USN-4211-2
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4211-1/
https://usn.ubuntu.com/4211-2/
https://usn.ubuntu.com/4226-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-17666 HIGH 3.10.0-1062.7.1.el7 3.10.0-1062.18.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-17666
https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1
https://linux.oracle.com/cve/CVE-2019-17666.html
https://linux.oracle.com/errata/ELSA-2020-5535.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/
https://lkml.org/lkml/2019/10/16/1226
https://lore.kernel.org/lkml/20191016205716.2843-1-labbott@redhat.com/
https://security.netapp.com/advisory/ntap-20191031-0005/
https://twitter.com/nicowaisman/status/1184864519316758535
https://ubuntu.com/security/notices/USN-4183-1
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4183-1/
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
kernel-headers CVE-2019-19768 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.8.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2019-19768
https://bugzilla.kernel.org/show_bug.cgi?id=205711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
https://linux.oracle.com/cve/CVE-2019-19768.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/linux-block/20200206142812.25989-1-jack@suse.cz/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2019-19807 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19807
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://git.kernel.org/linus/e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://github.com/torvalds/linux/commit/e7af6307a8a54f0b873960b32b6a644f2d0fbd97
https://linux.oracle.com/cve/CVE-2019-19807.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
kernel-headers CVE-2020-0466 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466
https://git.kernel.org/linus/52c479697c9b73f628140dcdfcd39ea302d05482
https://git.kernel.org/linus/a9ed4a6560b8562b7e2e2bed9527e88001f7b682
https://linux.oracle.com/cve/CVE-2020-0466.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://source.android.com/security/bulletin/2020-12-01
https://ubuntu.com/security/notices/USN-4912-1
kernel-headers CVE-2020-10711 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.8.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-10711
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
https://linux.oracle.com/cve/CVE-2020-10711.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lore.kernel.org/netdev/07d99ae197bfdb2964931201db67b6cd0b38db5b.1589276729.git.pabeni@redhat.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-10711
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4419-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/05/12/2
kernel-headers CVE-2020-10757 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.18.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-10757
https://bugzilla.redhat.com/show_bug.cgi?id=1842525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
https://linux.oracle.com/cve/CVE-2020-10757.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
https://nvd.nist.gov/vuln/detail/CVE-2020-10757
https://security.netapp.com/advisory/ntap-20200702-0004/
https://ubuntu.com/security/notices/USN-4426-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4483-1
https://usn.ubuntu.com/4426-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4483-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/06/04/4
kernel-headers CVE-2020-12362 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
kernel-headers CVE-2020-12653 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.18.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://www.openwall.com/lists/oss-security/2020/05/08/2
https://access.redhat.com/security/cve/CVE-2020-12653
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d
https://git.kernel.org/linus/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d (5.6-rc1)
https://github.com/torvalds/linux/commit/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d
https://linux.oracle.com/cve/CVE-2020-12653.html
https://linux.oracle.com/errata/ELSA-2021-9030.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12653
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-12654 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.18.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://www.openwall.com/lists/oss-security/2020/05/08/2
https://access.redhat.com/security/cve/CVE-2020-12654
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a9b153c5591548612c3955c9600a98150c81875
https://git.kernel.org/linus/3a9b153c5591548612c3955c9600a98150c81875 (5.6-rc1)
https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
https://linux.oracle.com/cve/CVE-2020-12654.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12654
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4392-1
https://ubuntu.com/security/notices/USN-4393-1
https://usn.ubuntu.com/4392-1/
https://usn.ubuntu.com/4393-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-12888 HIGH 3.10.0-1062.7.1.el7 3.10.0-1127.13.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://www.openwall.com/lists/oss-security/2020/05/19/6
https://access.redhat.com/security/cve/CVE-2020-12888
https://bugzilla.redhat.com/show_bug.cgi?id=1836244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888
https://linux.oracle.com/cve/CVE-2020-12888.html
https://linux.oracle.com/errata/ELSA-2020-5805.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXGMJHWTMQI34NJZ4BHL3ZVF264AWBF2/
https://lore.kernel.org/kvm/158871401328.15589.17598154478222071285.stgit@gimli.home/
https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit@gimli.home/
https://nvd.nist.gov/vuln/detail/CVE-2020-12888
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-5361-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
kernel-headers CVE-2020-8834 HIGH 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2020-8834
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834
https://ubuntu.com/security/notices/USN-4318-1
https://usn.ubuntu.com/4318-1/
https://usn.ubuntu.com/usn/usn-4318-1
https://www.openwall.com/lists/oss-security/2020/04/06/2
kernel-headers CVE-2021-0920 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca
https://linux.oracle.com/cve/CVE-2021-0920.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://source.android.com/security/bulletin/2021-11-01
https://ubuntu.com/security/notices/USN-5361-1
kernel-headers CVE-2021-22543 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.45.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22543.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22555.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3609.json
https://access.redhat.com/security/cve/CVE-2021-22543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543
https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584
https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97
https://linux.oracle.com/cve/CVE-2021-22543.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
https://security.netapp.com/advisory/ntap-20210708-0002/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://www.openwall.com/lists/oss-security/2021/05/26/3
https://www.openwall.com/lists/oss-security/2021/05/26/4
https://www.openwall.com/lists/oss-security/2021/05/26/5
kernel-headers CVE-2021-3347 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/01/29/4
http://www.openwall.com/lists/oss-security/2021/01/29/5
http://www.openwall.com/lists/oss-security/2021/02/01/4
https://access.redhat.com/security/cve/CVE-2021-3347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2
https://linux.oracle.com/cve/CVE-2021-3347.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3347
https://security.netapp.com/advisory/ntap-20210304-0005/
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4884-1
https://ubuntu.com/security/notices/USN-4907-1
https://ubuntu.com/security/notices/USN-4910-1
https://www.debian.org/security/2021/dsa-4843
https://www.openwall.com/lists/oss-security/2021/01/29/1
https://www.openwall.com/lists/oss-security/2021/01/29/3
kernel-headers CVE-2021-37576 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.45.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38201.json
https://access.redhat.com/security/cve/CVE-2021-37576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://linux.oracle.com/cve/CVE-2021-37576.html
https://linux.oracle.com/errata/ELSA-2021-3801.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-37576
https://security.netapp.com/advisory/ntap-20210917-0005/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/07/26/1
kernel-headers CVE-2021-3864 HIGH 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
kernel-headers CVE-2021-4155 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json
https://access.redhat.com/security/cve/CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/10/1
kernel-headers CVE-2022-0330 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json
https://access.redhat.com/security/cve/CVE-2022-0330
https://bugzilla.redhat.com/show_bug.cgi?id=2042404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0330
https://security.netapp.com/advisory/ntap-20220526-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
kernel-headers CVE-2022-1012 HIGH 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6)
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
https://ubuntu.com/security/notices/USN-5471-1
kernel-headers CVE-2022-22942 HIGH 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://linux.oracle.com/cve/CVE-2022-22942.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5362-1
https://www.openwall.com/lists/oss-security/2022/01/27/4
kernel-headers CVE-2012-4542 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://access.redhat.com/security/cve/CVE-2012-4542
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
kernel-headers CVE-2013-4270 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01
http://rhn.redhat.com/errata/RHSA-2014-0100.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
http://www.ubuntu.com/usn/USN-2049-1
https://access.redhat.com/security/cve/CVE-2013-4270
https://bugzilla.redhat.com/show_bug.cgi?id=1027752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
https://linux.oracle.com/cve/CVE-2013-4270.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://ubuntu.com/security/notices/USN-2020-1
https://ubuntu.com/security/notices/USN-2023-1
https://ubuntu.com/security/notices/USN-2049-1
kernel-headers CVE-2013-4350 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=95ee62083cb6453e056562d91f597552021e6ae7
http://rhn.redhat.com/errata/RHSA-2013-1490.html
http://www.openwall.com/lists/oss-security/2013/09/13
http://www.openwall.com/lists/oss-security/2013/09/13/3
http://www.ubuntu.com/usn/USN-2019-1
http://www.ubuntu.com/usn/USN-2021-1
http://www.ubuntu.com/usn/USN-2022-1
http://www.ubuntu.com/usn/USN-2024-1
http://www.ubuntu.com/usn/USN-2038-1
http://www.ubuntu.com/usn/USN-2039-1
http://www.ubuntu.com/usn/USN-2041-1
http://www.ubuntu.com/usn/USN-2045-1
http://www.ubuntu.com/usn/USN-2049-1
http://www.ubuntu.com/usn/USN-2050-1
https://access.redhat.com/security/cve/CVE-2013-4350
https://bugzilla.redhat.com/show_bug.cgi?id=1007872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350
https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
https://linux.oracle.com/cve/CVE-2013-4350.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://ubuntu.com/security/notices/USN-2019-1
https://ubuntu.com/security/notices/USN-2021-1
https://ubuntu.com/security/notices/USN-2022-1
https://ubuntu.com/security/notices/USN-2024-1
https://ubuntu.com/security/notices/USN-2038-1
https://ubuntu.com/security/notices/USN-2039-1
https://ubuntu.com/security/notices/USN-2041-1
https://ubuntu.com/security/notices/USN-2045-1
https://ubuntu.com/security/notices/USN-2049-1
https://ubuntu.com/security/notices/USN-2050-1
kernel-headers CVE-2013-7446 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3426
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
http://www.openwall.com/lists/oss-security/2015/11/18/16
http://www.openwall.com/lists/oss-security/2015/11/18/9
http://www.securityfocus.com/bid/77638
http://www.securitytracker.com/id/1034557
http://www.spinics.net/lists/netdev/msg318826.html
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2013-7446
https://bugzilla.redhat.com/show_bug.cgi?id=1273845
https://bugzilla.redhat.com/show_bug.cgi?id=1282688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8
https://linux.oracle.com/cve/CVE-2013-7446.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://lkml.org/lkml/2013/10/14/424
https://lkml.org/lkml/2014/5/15/532
https://lkml.org/lkml/2015/9/13/195
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
kernel-headers CVE-2014-2039 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d7f6690cedb83456edd41c9bd583783f0703bf0
http://linux.oracle.com/errata/ELSA-2014-0771.html
http://secunia.com/advisories/59262
http://secunia.com/advisories/59309
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.5
http://www.openwall.com/lists/oss-security/2014/02/20/14
http://www.securityfocus.com/bid/65700
https://access.redhat.com/security/cve/CVE-2014-2039
https://bugzilla.redhat.com/show_bug.cgi?id=1067558
https://github.com/torvalds/linux/commit/8d7f6690cedb83456edd41c9bd583783f0703bf0
https://linux.oracle.com/cve/CVE-2014-2039.html
https://linux.oracle.com/errata/ELSA-2014-0771.html
kernel-headers CVE-2014-9710 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
http://www.openwall.com/lists/oss-security/2015/03/24/11
http://www.securitytracker.com/id/1032418
https://access.redhat.com/security/cve/CVE-2014-9710
https://bugzilla.redhat.com/show_bug.cgi?id=1205079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710
https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
https://linux.oracle.com/cve/CVE-2014-9710.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-2615-1
https://ubuntu.com/security/notices/USN-2616-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
kernel-headers CVE-2014-9728 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9728
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://linux.oracle.com/cve/CVE-2014-9728.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
kernel-headers CVE-2014-9729 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9729
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
kernel-headers CVE-2014-9730 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9730
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
kernel-headers CVE-2015-4167 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.debian.org/security/2015/dsa-3290
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
http://www.openwall.com/lists/oss-security/2015/06/02/6
http://www.securityfocus.com/bid/74963
http://www.securitytracker.com/id/1033187
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
https://access.redhat.com/security/cve/CVE-2015-4167
https://bugzilla.redhat.com/show_bug.cgi?id=1228204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167
https://github.com/torvalds/linux/commit/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
https://linux.oracle.com/cve/CVE-2015-4167.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-2631-1
https://ubuntu.com/security/notices/USN-2632-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2666-1
kernel-headers CVE-2015-4177 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
http://openwall.com/lists/oss-security/2015/05/29/10
http://openwall.com/lists/oss-security/2015/05/29/5
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
http://www.openwall.com/lists/oss-security/2015/06/04/5
https://access.redhat.com/security/cve/CVE-2015-4177
https://bugzilla.redhat.com/show_bug.cgi?id=1248486
https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
kernel-headers CVE-2015-4692 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/06/10/6
http://www.openwall.com/lists/oss-security/2015/06/21/1
http://www.securityfocus.com/bid/75142
http://www.securitytracker.com/id/1032798
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
https://access.redhat.com/security/cve/CVE-2015-4692
https://bugzilla.redhat.com/show_bug.cgi?id=1230770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692
https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
https://lkml.org/lkml/2015/6/4/163
https://ubuntu.com/security/notices/USN-2680-1
https://ubuntu.com/security/notices/USN-2681-1
https://ubuntu.com/security/notices/USN-2682-1
https://ubuntu.com/security/notices/USN-2683-1
https://ubuntu.com/security/notices/USN-2684-1
kernel-headers CVE-2015-5707 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/08/01/6
http://www.securityfocus.com/bid/76145
http://www.securitytracker.com/id/1033521
http://www.ubuntu.com/usn/USN-2733-1
http://www.ubuntu.com/usn/USN-2734-1
http://www.ubuntu.com/usn/USN-2737-1
http://www.ubuntu.com/usn/USN-2738-1
http://www.ubuntu.com/usn/USN-2750-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
https://access.redhat.com/security/cve/CVE-2015-5707
https://bugzilla.redhat.com/show_bug.cgi?id=1250030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707
https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81
https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee
https://linux.oracle.com/cve/CVE-2015-5707.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2733-1
https://ubuntu.com/security/notices/USN-2734-1
https://ubuntu.com/security/notices/USN-2737-1
https://ubuntu.com/security/notices/USN-2738-1
https://ubuntu.com/security/notices/USN-2750-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
kernel-headers CVE-2015-7513 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2016/01/07/2
http://www.securityfocus.com/bid/79901
http://www.securitytracker.com/id/1034602
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-7513
https://bugzilla.redhat.com/show_bug.cgi?id=1284847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
https://git.kernel.org/linus/0185604c2d82c560dab2f2933a18f797e74ab5a8 (v4.4-rc7)
https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
kernel-headers CVE-2015-7550 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.securityfocus.com/bid/79903
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
http://www.ubuntu.com/usn/USN-2911-1
http://www.ubuntu.com/usn/USN-2911-2
https://access.redhat.com/security/cve/CVE-2015-7550
https://bugzilla.redhat.com/show_bug.cgi?id=1291197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
https://git.kernel.org/linus/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://security-tracker.debian.org/tracker/CVE-2015-7550
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
https://ubuntu.com/security/notices/USN-2911-1
https://ubuntu.com/security/notices/USN-2911-2
kernel-headers CVE-2015-8953 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5
http://seclists.org/oss-sec/2016/q3/371
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6
http://www.openwall.com/lists/oss-security/2016/08/23/9
http://www.securityfocus.com/bid/92611
https://access.redhat.com/security/cve/CVE-2015-8953
https://bugzilla.redhat.com/show_bug.cgi?id=1367814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953
https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5
kernel-headers CVE-2015-9289 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...https://access.redhat.com/security/cve/CVE-2015-9289
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fa2337a315a2448c5434f41e00d56b01a22283c
https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c
https://linux.oracle.com/cve/CVE-2015-9289.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.4
kernel-headers CVE-2016-0723 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lkml.iu.edu/hypermail/linux/kernel/1511.3/03045.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/82950
http://www.securitytracker.com/id/1035695
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-0723
https://bugzilla.redhat.com/show_bug.cgi?id=1296253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723
https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
https://linux.oracle.com/cve/CVE-2016-0723.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://security-tracker.debian.org/tracker/CVE-2016-0723
https://support.f5.com/csp/article/K43650115
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-0821 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
http://source.android.com/security/bulletin/2016-03-01.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2015/05/02/6
http://www.securityfocus.com/bid/84260
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2016-0821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
kernel-headers CVE-2016-10044 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a
http://source.android.com/security/bulletin/2017-02-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7
http://www.securityfocus.com/bid/96122
http://www.securitytracker.com/id/1037798
https://access.redhat.com/security/cve/CVE-2016-10044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://linux.oracle.com/cve/CVE-2016-10044.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
kernel-headers CVE-2016-2085 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://access.redhat.com/security/cve/CVE-2016-2085
https://bugzilla.redhat.com/show_bug.cgi?id=1324867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2085
https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
https://security-tracker.debian.org/tracker/CVE-2016-2085
https://ubuntu.com/security/notices/USN-2946-1
https://ubuntu.com/security/notices/USN-2946-2
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2949-1
kernel-headers CVE-2016-2546 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af368027a49a751d6ff4ee9e3f9961f35bb4fede
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83384
http://www.securitytracker.com/id/1035301
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2546
https://bugzilla.redhat.com/show_bug.cgi?id=1311564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546
https://github.com/torvalds/linux/commit/af368027a49a751d6ff4ee9e3f9961f35bb4fede
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-3157 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2016/dsa-3607
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84594
http://www.securitytracker.com/id/1035308
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://xenbits.xen.org/xsa/advisory-171.html
http://xenbits.xen.org/xsa/xsa171.patch
https://access.redhat.com/security/cve/CVE-2016-3157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
https://linux.oracle.com/cve/CVE-2016-3157.html
https://linux.oracle.com/errata/ELSA-2016-3657.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
kernel-headers CVE-2016-4794 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://rhn.redhat.com/errata/RHSA-2016-2574.html
http://rhn.redhat.com/errata/RHSA-2016-2584.html
http://www.openwall.com/lists/oss-security/2016/05/12/6
http://www.securityfocus.com/bid/90625
http://www.ubuntu.com/usn/USN-3053-1
http://www.ubuntu.com/usn/USN-3054-1
http://www.ubuntu.com/usn/USN-3055-1
http://www.ubuntu.com/usn/USN-3056-1
http://www.ubuntu.com/usn/USN-3057-1
https://access.redhat.com/security/cve/CVE-2016-4794
https://bugzilla.redhat.com/show_bug.cgi?id=1335889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794
https://linux.oracle.com/cve/CVE-2016-4794.html
https://linux.oracle.com/errata/ELSA-2016-3644.html
https://lkml.org/lkml/2016/4/17/125
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3053-1
https://ubuntu.com/security/notices/USN-3054-1
https://ubuntu.com/security/notices/USN-3055-1
https://ubuntu.com/security/notices/USN-3056-1
https://ubuntu.com/security/notices/USN-3057-1
kernel-headers CVE-2016-7911 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.6
http://www.securityfocus.com/bid/94135
https://access.redhat.com/security/cve/CVE-2016-7911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911
https://github.com/torvalds/linux/commit/8ba8682107ee2ca3347354e018865d8e1967c5f4
https://ubuntu.com/security/notices/USN-3206-1
https://ubuntu.com/security/notices/USN-3207-1
https://ubuntu.com/security/notices/USN-3207-2
kernel-headers CVE-2017-1000111 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100267
http://www.securitytracker.com/id/1039132
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/security/cve/CVE-2017-1000111
https://access.redhat.com/security/cve/cve-2017-1000111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=c27927e372f0785f3303e8fad94b85945e2c97b7
https://linux.oracle.com/cve/CVE-2017-1000111.html
https://linux.oracle.com/errata/ELSA-2017-3633.html
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
kernel-headers CVE-2017-1000380 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
http://www.securityfocus.com/bid/99121
https://access.redhat.com/errata/RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3322
https://access.redhat.com/security/cve/CVE-2017-1000380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
https://linux.oracle.com/cve/CVE-2017-1000380.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://source.android.com/security/bulletin/pixel/2017-12-01
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
kernel-headers CVE-2017-11176 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99919
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/security/cve/CVE-2017-11176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-11176.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3468-1
https://ubuntu.com/security/notices/USN-3468-2
https://ubuntu.com/security/notices/USN-3468-3
https://ubuntu.com/security/notices/USN-3470-1
https://ubuntu.com/security/notices/USN-3470-2
https://www.exploit-db.com/exploits/45553/
kernel-headers CVE-2017-11600 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/bugtraq/2017/Jul/30
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99928
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/security/cve/CVE-2017-11600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/xfrm/xfrm_policy.c?id=7bab09631c2a303f87a7eb7e3d69e888673b9b7e
https://linux.oracle.com/cve/CVE-2017-11600.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://source.android.com/security/bulletin/pixel/2017-11-01
kernel-headers CVE-2017-13693 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
kernel-headers CVE-2017-13694 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/100500
https://access.redhat.com/security/cve/CVE-2017-13694
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
kernel-headers CVE-2017-13695 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/100497
https://access.redhat.com/security/cve/CVE-2017-13695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
https://linux.oracle.com/cve/CVE-2017-13695.html
https://linux.oracle.com/errata/ELSA-2018-4250.html
https://patchwork.kernel.org/patch/9850567/
https://ubuntu.com/security/notices/USN-3696-1
https://ubuntu.com/security/notices/USN-3696-2
https://ubuntu.com/security/notices/USN-3762-1
https://ubuntu.com/security/notices/USN-3762-2
https://usn.ubuntu.com/3696-1/
https://usn.ubuntu.com/3696-2/
https://usn.ubuntu.com/3762-1/
https://usn.ubuntu.com/3762-2/
kernel-headers CVE-2017-14051 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/100571
https://access.redhat.com/security/cve/CVE-2017-14051
https://bugzilla.kernel.org/show_bug.cgi?id=194061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051
https://github.com/torvalds/linux/commit/e6f77540c067b48dee10f1e33678415bfcc89017
https://linux.oracle.com/cve/CVE-2017-14051.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9929625/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-14106 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100878
http://www.securitytracker.com/id/1039549
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/security/cve/CVE-2017-14106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://github.com/torvalds/linux/commit/499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://linux.oracle.com/cve/CVE-2017-14106.html
https://linux.oracle.com/errata/ELSA-2018-4235.html
https://ubuntu.com/security/notices/USN-3443-1
https://ubuntu.com/security/notices/USN-3443-2
https://ubuntu.com/security/notices/USN-3443-3
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3445-1
https://ubuntu.com/security/notices/USN-3445-2
https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html
kernel-headers CVE-2017-14489 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/101011
https://access.redhat.com/security/cve/CVE-2017-14489
https://bugzilla.redhat.com/show_bug.cgi?id=1490421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
https://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git/commit/drivers/scsi/scsi_transport_iscsi.c?h=fixes&id=c88f0e6b06f4092995688211a631bb436125d77b
https://linux.oracle.com/cve/CVE-2017-14489.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://patchwork.kernel.org/patch/9923803/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.exploit-db.com/exploits/42932/
kernel-headers CVE-2017-14497 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edbd58be15a957f6a760c4a514cd475217eb97fd
http://seclists.org/oss-sec/2017/q3/476
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100871
http://www.securitytracker.com/id/1039371
http://www.securitytracker.com/id/1040106
https://access.redhat.com/security/cve/CVE-2017-14497
https://bugzilla.redhat.com/show_bug.cgi?id=1492593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497
https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd
https://marc.info/?l=linux-kernel&m=150394500728906&w=2
https://marc.info/?t=150394517700001&r=1&w=2
https://source.android.com/security/bulletin/2018-01-01
kernel-headers CVE-2017-15128 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
http://post-office.corp.redhat.com/archives/rhkernel-list/2017-October/msg09574.html
https://access.redhat.com/security/cve/CVE-2017-15128
https://bugzilla.redhat.com/show_bug.cgi?id=1525222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128
https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
https://linux.oracle.com/cve/CVE-2017-15128.html
https://linux.oracle.com/errata/ELSA-2019-4850.html
https://marc.info/?l=linux-mm&m=150819356125109
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
kernel-headers CVE-2017-15265 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.openwall.com/lists/oss-security/2017/10/11/3
http://www.securityfocus.com/bid/101288
http://www.securitytracker.com/id/1039561
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3823
https://access.redhat.com/security/cve/CVE-2017-15265
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-15265.html
https://linux.oracle.com/errata/ELSA-2018-2390.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://source.android.com/security/bulletin/2018-02-01
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
kernel-headers CVE-2017-15299 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-15299
https://bugzilla.redhat.com/show_bug.cgi?id=1498016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15299
https://linux.oracle.com/cve/CVE-2017-15299.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://marc.info/?t=150654188100001&r=1&w=2
https://marc.info/?t=150783958600011&r=1&w=2
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
https://ubuntu.com/security/notices/USN-3798-1
https://ubuntu.com/security/notices/USN-3798-2
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
kernel-headers CVE-2017-16528 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528
https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57
https://groups.google.com/d/msg/syzkaller/kuZzDHGkQu8/5du20rZEAAAJ
https://linux.oracle.com/cve/CVE-2017-16528.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
kernel-headers CVE-2017-17807 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
http://www.securityfocus.com/bid/102301
https://access.redhat.com/security/cve/CVE-2017-17807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
https://linux.oracle.com/cve/CVE-2017-17807.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
kernel-headers CVE-2017-18079 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226
http://www.securityfocus.com/bid/102895
https://access.redhat.com/security/cve/CVE-2017-18079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18079
https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226
https://linux.oracle.com/cve/CVE-2017-18079.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
kernel-headers CVE-2017-18551 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2017-18551
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551
https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://linux.oracle.com/cve/CVE-2017-18551.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://support.f5.com/csp/article/K48073202?utm_source=f5support&utm_medium=RSS
kernel-headers CVE-2017-5972 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2017/q1/573
http://www.securityfocus.com/bid/96231
https://access.redhat.com/security/cve/CVE-2017-5972
https://access.redhat.com/security/cve/cve-2017-5972
https://bugzilla.redhat.com/show_bug.cgi?id=1422081
https://cxsecurity.com/issue/WLB-2017020112
https://githubengineering.com/syn-flood-mitigation-with-synsanity/
https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html
https://security-tracker.debian.org/tracker/CVE-2017-5972
https://www.exploit-db.com/exploits/41350/
kernel-headers CVE-2017-7541 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f44c9a41386729fea410e688959ddaa9d51be7c
http://openwall.com/lists/oss-security/2017/07/24/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3
http://www.securityfocus.com/bid/99955
http://www.securitytracker.com/id/1038981
https://access.redhat.com/errata/RHSA-2017:2863
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7541
https://bugzilla.novell.com/show_bug.cgi?id=1049645
https://bugzilla.redhat.com/show_bug.cgi?id=1473198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541
https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c
https://linux.oracle.com/cve/CVE-2017-7541.html
https://linux.oracle.com/errata/ELSA-2017-3629.html
https://source.android.com/security/bulletin/2017-11-01
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://www.spinics.net/lists/stable/msg180994.html
kernel-headers CVE-2017-7542 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99953
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/security/cve/CVE-2017-7542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542
https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-7542.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-7558 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2017/q3/338
http://www.securityfocus.com/bid/100466
http://www.securitytracker.com/id/1039221
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7558
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/sctp/socket.c?id=ee6c88bb754e3d363e568da78086adfedb692447
https://linux.oracle.com/cve/CVE-2017-7558.html
https://linux.oracle.com/errata/ELSA-2017-2930.html
https://marc.info/?l=linux-netdev&m=150348777122761&w=2
https://www.debian.org/security/2017/dsa-3981
kernel-headers CVE-2017-9211 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://access.redhat.com/security/cve/CVE-2017-9211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211
https://git.kernel.org/linus/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://patchwork.kernel.org/patch/9718933/
kernel-headers CVE-2018-17977 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
kernel-headers CVE-2018-20169 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2018-20169
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
https://git.kernel.org/linus/704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://linux.oracle.com/cve/CVE-2018-20169.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://ubuntu.com/security/notices/USN-3879-1
https://ubuntu.com/security/notices/USN-3879-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3879-1/
https://usn.ubuntu.com/3879-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
kernel-headers CVE-2018-20836 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://www.securityfocus.com/bid/108196
https://access.redhat.com/security/cve/CVE-2018-20836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
https://linux.oracle.com/cve/CVE-2018-20836.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://security.netapp.com/advisory/ntap-20190719-0003/
https://support.f5.com/csp/article/K11225249
https://ubuntu.com/security/notices/USN-4076-1
https://usn.ubuntu.com/4076-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
kernel-headers CVE-2018-7191 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108380
https://access.redhat.com/security/cve/CVE-2018-7191
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9
https://git.kernel.org/linus/0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://git.kernel.org/linus/5c25f65fd1e42685f7ccd80e0621829c105785d9
https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9
https://linux.oracle.com/cve/CVE-2018-7191.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
kernel-headers CVE-2019-10207 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-10207
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
https://linux.oracle.com/cve/CVE-2019-10207.html
https://linux.oracle.com/errata/ELSA-2021-9534.html
https://lore.kernel.org/linux-bluetooth/20190729122215.9948-1-vdronov@redhat.com/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://www.openwall.com/lists/oss-security/2019/07/25/1
kernel-headers CVE-2019-11884 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
http://www.securityfocus.com/bid/108299
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-11884
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16
https://git.kernel.org/linus/a1616a5ac99ede5d605047a9012481ce7ff18b16
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16
https://linux.oracle.com/cve/CVE-2019-11884.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPWHQHNM2MSGO3FDJVIQXQNKYVR7TV45/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAYXGGJUUYPOMCBZGGDCUZFLUU3JOZG5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF2PDXUGOFEOTPVEACKFIHQB6O4XUIZD/
https://seclists.org/bugtraq/2019/Jun/26
https://ubuntu.com/security/notices/USN-4068-1
https://ubuntu.com/security/notices/USN-4068-2
https://ubuntu.com/security/notices/USN-4069-1
https://ubuntu.com/security/notices/USN-4069-2
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4068-1/
https://usn.ubuntu.com/4068-2/
https://usn.ubuntu.com/4069-1/
https://usn.ubuntu.com/4069-2/
https://usn.ubuntu.com/4076-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4465
kernel-headers CVE-2019-12382 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://access.redhat.com/security/cve/CVE-2019-12382
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
kernel-headers CVE-2019-13233 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-13233
https://bugs.chromium.org/p/project-zero/issues/detail?id=1879
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323
https://github.com/torvalds/linux/commit/de9f869616dd95e95c00bdd6b0fcd3421e8a4323
https://linux.oracle.com/cve/CVE-2019-13233.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://seclists.org/bugtraq/2019/Aug/13
https://security.netapp.com/advisory/ntap-20190806-0001/
https://support.f5.com/csp/article/K13331647?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
kernel-headers CVE-2019-13631 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/109291
https://access.redhat.com/security/cve/CVE-2019-13631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
https://linux.oracle.com/cve/CVE-2019-13631.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQ5BQKTI24DPSVKPOIMMGDTFKCF6ASXT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUXTJSLIQBOJTQDMTUQTQKUWWAJLFVEY/
https://patchwork.kernel.org/patch/11040813/
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://usn.ubuntu.com/4147-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
kernel-headers CVE-2019-13648 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/07/30/1
https://access.redhat.com/security/cve/CVE-2019-13648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe
https://linux.oracle.com/cve/CVE-2019-13648.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRK2MW223KQZ76DKEF2BZFN6TCXLZLDS/
https://patchwork.ozlabs.org/patch/1133904/
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
kernel-headers CVE-2019-14283 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...Changelog
Upstream commit
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-14283
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6
https://git.kernel.org/linus/da99466ac243f15fbba65bd261bfc75ffa1532b6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6
https://linux.oracle.com/cve/CVE-2019-14283.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
kernel-headers CVE-2019-14284 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-14284
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32
https://git.kernel.org/linus/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://linux.oracle.com/cve/CVE-2019-14284.html
https://linux.oracle.com/errata/ELSA-2019-4855.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
kernel-headers CVE-2019-14615 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
http://seclists.org/fulldisclosure/2020/Mar/31
https://access.redhat.com/security/cve/CVE-2019-14615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc8a76a152c5f9ef3b48104154a65a68a8b76946
https://linux.oracle.com/cve/CVE-2019-14615.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://support.apple.com/kb/HT211100
https://ubuntu.com/security/notices/USN-4253-1
https://ubuntu.com/security/notices/USN-4253-2
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4255-1
https://ubuntu.com/security/notices/USN-4255-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4253-1/
https://usn.ubuntu.com/4253-2/
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4255-1/
https://usn.ubuntu.com/4255-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
kernel-headers CVE-2019-14814 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/28/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/security/cve/CVE-2019-14814
https://access.redhat.com/security/cve/cve-2019-14814
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://linux.oracle.com/cve/CVE-2019-14814.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.openwall.com/lists/oss-security/2019/08/28/1
kernel-headers CVE-2019-14815 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/errata/RHSA-2020:0328
https://access.redhat.com/errata/RHSA-2020:0339
https://access.redhat.com/security/cve/CVE-2019-14815
https://access.redhat.com/security/cve/cve-2019-14815
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
https://linux.oracle.com/cve/CVE-2019-14815.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com
https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://www.openwall.com/lists/oss-security/2019/08/28/1
kernel-headers CVE-2019-14898 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1062.12.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-14898
https://bugs.chromium.org/p/project-zero/issues/detail?id=1790
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
https://linux.oracle.com/cve/CVE-2019-14898.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-15213 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
kernel-headers CVE-2019-15214 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15214
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7
https://linux.oracle.com/cve/CVE-2019-15214.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
kernel-headers CVE-2019-15505 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-15505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
https://linux.oracle.com/cve/CVE-2019-15505.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q@gofer.mess.org/
https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11@gmail.com/
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K28222050
https://support.f5.com/csp/article/K28222050?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
kernel-headers CVE-2019-15916 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/errata/RHSA-2020:0740
https://access.redhat.com/security/cve/CVE-2019-15916
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
https://git.kernel.org/linus/895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
https://linux.oracle.com/cve/CVE-2019-15916.html
https://linux.oracle.com/errata/ELSA-2020-5532.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K57418558?utm_source=f5support&utm_medium=RSS
kernel-headers CVE-2019-15917 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-15917
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917
https://git.kernel.org/linus/56897b217a1d0a91c9920cb418d6b3fe922f590a
https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
https://linux.oracle.com/cve/CVE-2019-15917.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191004-0001/
kernel-headers CVE-2019-16746 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-16746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
https://linux.oracle.com/cve/CVE-2019-16746.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TASE2ESEZAER6DTZH3DJ4K2JNO46TVL7/
https://marc.info/?l=linux-wireless&m=156901391225058&w=2
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20191031-0005/
https://ubuntu.com/security/notices/USN-4183-1
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4209-1
https://ubuntu.com/security/notices/USN-4210-1
https://usn.ubuntu.com/4183-1/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4209-1/
https://usn.ubuntu.com/4210-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-17053 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-17053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
https://git.kernel.org/linus/e69dbd4619e7674c1679cba49afd9dd9ac347eef
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef
https://linux.oracle.com/cve/CVE-2019-17053.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
https://seclists.org/bugtraq/2019/Nov/11
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4185-2
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4185-2/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
kernel-headers CVE-2019-17055 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0790
https://access.redhat.com/security/cve/CVE-2019-17055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
https://git.kernel.org/linus/b91ee4aa2a2199ba4d4650706c272985a5a32d80
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80
https://linux.oracle.com/cve/CVE-2019-17055.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/
https://seclists.org/bugtraq/2019/Nov/11
https://ubuntu.com/security/notices/USN-4184-1
https://ubuntu.com/security/notices/USN-4185-1
https://ubuntu.com/security/notices/USN-4185-2
https://ubuntu.com/security/notices/USN-4186-1
https://ubuntu.com/security/notices/USN-4186-2
https://usn.ubuntu.com/4184-1/
https://usn.ubuntu.com/4185-1/
https://usn.ubuntu.com/4185-2/
https://usn.ubuntu.com/4186-1/
https://usn.ubuntu.com/4186-2/
kernel-headers CVE-2019-18660 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/11/27/1
https://access.redhat.com/errata/RHSA-2020:0174
https://access.redhat.com/security/cve/CVE-2019-18660
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
https://linux.oracle.com/cve/CVE-2019-18660.html
https://linux.oracle.com/errata/ELSA-2020-2933.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
https://www.openwall.com/lists/oss-security/2019/11/27/1
kernel-headers CVE-2019-18808 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/security/cve/CVE-2019-18808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2
https://linux.oracle.com/cve/CVE-2019-18808.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
kernel-headers CVE-2019-19036 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4439-1/
kernel-headers CVE-2019-19046 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19046
https://bugzilla.suse.com/show_bug.cgi?id=1157304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
https://linux.oracle.com/cve/CVE-2019-19046.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4302-1
https://ubuntu.com/security/notices/USN-4319-1
https://ubuntu.com/security/notices/USN-4325-1
https://usn.ubuntu.com/4302-1/
https://usn.ubuntu.com/4319-1/
https://usn.ubuntu.com/4325-1/
kernel-headers CVE-2019-19055 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19055
https://bugzilla.suse.com/show_bug.cgi?id=1157319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055
https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
https://linux.oracle.com/cve/CVE-2019-19055.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
kernel-headers CVE-2019-19077 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077
https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
kernel-headers CVE-2019-19332 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19332
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332
https://git.kernel.org/linus/433f4ba1904100da65a311033f17a9bf586b287e
https://linux.oracle.com/cve/CVE-2019-19332.html
https://linux.oracle.com/errata/ELSA-2020-5535.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.openwall.com/lists/oss-security/2019/12/16/1
kernel-headers CVE-2019-19338 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1062.18.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19338
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19338
https://linux.oracle.com/cve/CVE-2019-19338.html
https://linux.oracle.com/errata/ELSA-2020-0834.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19338
https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort
https://www.openwall.com/lists/oss-security/2019/12/10/3
kernel-headers CVE-2019-19377 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
https://linux.oracle.com/cve/CVE-2019-19377.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4414-1/
kernel-headers CVE-2019-19447 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19447
https://bugzilla.kernel.org/show_bug.cgi?id=205433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447
https://linux.oracle.com/cve/CVE-2019-19447.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/r/20191112032903.8828-1-tytso@mit.edu
https://security.netapp.com/advisory/ntap-20200103-0001/
kernel-headers CVE-2019-19523 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19523
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523
https://git.kernel.org/linus/44efc269db7929f6275a1fa927ef082e533ecde0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0
https://linux.oracle.com/cve/CVE-2019-19523.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
kernel-headers CVE-2019-19524 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19524
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524
https://git.kernel.org/linus/fa3a5a1880c91bb92594ad42dfe9eedad7996b86
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86
https://linux.oracle.com/cve/CVE-2019-19524.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
kernel-headers CVE-2019-19527 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.18.2.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19527
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527
https://git.kernel.org/linus/6d4472d7bec39917b54e4e80245784ea5d60ce49
https://git.kernel.org/linus/9c09b214f30e3c11f9b0b03f89442df03643794d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
https://linux.oracle.com/cve/CVE-2019-19527.html
https://linux.oracle.com/errata/ELSA-2020-5709.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
kernel-headers CVE-2019-19528 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19528
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528
https://git.kernel.org/linus/edc4746f253d907d048de680a621e121517f484b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b
https://linux.oracle.com/cve/CVE-2019-19528.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
kernel-headers CVE-2019-19530 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://seclists.org/oss-sec/2019/q4/115
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19530
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530
https://git.kernel.org/linus/c52873e5a1ef72f845526d9f6a50704433f9c625
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
https://linux.oracle.com/cve/CVE-2019-19530.html
https://linux.oracle.com/errata/ELSA-2020-5956.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
kernel-headers CVE-2019-19534 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19534
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534
https://git.kernel.org/linus/f7a1337f0d29b98733c8824e165fca3371d7d4fd
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd
https://linux.oracle.com/cve/CVE-2019-19534.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4228-1
https://ubuntu.com/security/notices/USN-4228-2
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4228-1/
https://usn.ubuntu.com/4228-2/
kernel-headers CVE-2019-19536 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19536
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536
https://git.kernel.org/linus/ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://linux.oracle.com/cve/CVE-2019-19536.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://www.nxp.com/docs/en/reference-manual/BCANPSV2.pdf
kernel-headers CVE-2019-19537 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19537
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537
https://git.kernel.org/linus/303911cfc5b95d33687d9046133ff184cf5043ff
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
https://linux.oracle.com/cve/CVE-2019-19537.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
kernel-headers CVE-2019-19767 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19767
https://bugzilla.kernel.org/show_bug.cgi?id=205609
https://bugzilla.kernel.org/show_bug.cgi?id=205707
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://git.kernel.org/linus/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://linux.oracle.com/cve/CVE-2019-19767.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-19770 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-19770
https://bugzilla.kernel.org/show_bug.cgi?id=205713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770
https://github.com/mcgrof/break-blktrace
https://linux.oracle.com/cve/CVE-2019-19770.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof@kernel.org/
https://lore.kernel.org/linux-block/20200419194529.4872-1-mcgrof@kernel.org/
https://lore.kernel.org/linux-block/20200516031956.2605-1-mcgrof@kernel.org/
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4680-1
kernel-headers CVE-2019-19816 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816
https://linux.oracle.com/cve/CVE-2019-19816.html
https://linux.oracle.com/errata/ELSA-2020-5995.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://usn.ubuntu.com/4414-1/
kernel-headers CVE-2019-19927 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927
https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428
https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39
https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4
https://security.netapp.com/advisory/ntap-20200204-0002/
kernel-headers CVE-2019-2054 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-2054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f3912fd934cdfd03d93f2dc6f064099795bf638
https://github.com/GrapheneOS/kernel_google_marlin/commit/bac2f2dde8af50c477b580743deb688db25e9e63
https://source.android.com/security/bulletin/2019-05-01
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4095-2
https://usn.ubuntu.com/4076-1/
https://usn.ubuntu.com/4095-2/
kernel-headers CVE-2019-20636 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-20636
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636
https://git.kernel.org/linus/cb222aed03d798fc074be55e59d9a112338ee784
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784
https://github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784
https://linux.oracle.com/cve/CVE-2019-20636.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200430-0004/
kernel-headers CVE-2019-20794 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://access.redhat.com/security/cve/CVE-2019-20794
https://github.com/sargun/fuse-example
https://nvd.nist.gov/vuln/detail/CVE-2019-20794
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
kernel-headers CVE-2019-20812 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2019-20812
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812
https://git.kernel.org/linus/b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://linux.oracle.com/cve/CVE-2019-20812.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-3874 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-3874
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911
https://linux.oracle.com/cve/CVE-2019-3874.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u
https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/
https://security.netapp.com/advisory/ntap-20190411-0003/
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-3982-1
https://ubuntu.com/security/notices/USN-3982-2
https://usn.ubuntu.com/3979-1/
https://usn.ubuntu.com/3980-1/
https://usn.ubuntu.com/3980-2/
https://usn.ubuntu.com/3981-1/
https://usn.ubuntu.com/3981-2/
https://usn.ubuntu.com/3982-1/
https://usn.ubuntu.com/3982-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-3901 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://www.securityfocus.com/bid/89937
https://access.redhat.com/security/cve/CVE-2019-3901
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901
https://linux.oracle.com/cve/CVE-2019-3901.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://security.netapp.com/advisory/ntap-20190517-0005/
kernel-headers CVE-2019-5108 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://access.redhat.com/security/cve/CVE-2019-5108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
https://git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e
https://linux.oracle.com/cve/CVE-2019-5108.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200204-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.debian.org/security/2020/dsa-4698
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-9454 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454
https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://linux.oracle.com/cve/CVE-2019-9454.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://source.android.com/security/bulletin/pixel/2019-09-01
kernel-headers CVE-2019-9458 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-9458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458
https://git.kernel.org/linus/ad608fbcf166fec809e402d548761768f602702c
https://linux.oracle.com/cve/CVE-2019-9458.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://source.android.com/security/bulletin/pixel/2019-09-01
kernel-headers CVE-2019-9503 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-9503
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html#cve-2019-9503-remotely-sending-firmware-events-bypassing-is-wlc-event-frame
https://bugzilla.redhat.com/show_bug.cgi?id=1701842
https://bugzilla.suse.com/show_bug.cgi?id=1132828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f
https://kb.cert.org/vuls/id/166939/
https://linux.oracle.com/cve/CVE-2019-9503.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9503.html
https://security-tracker.debian.org/tracker/CVE-2019-9503
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4095-1
https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
kernel-headers CVE-2020-0305 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-0305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305
https://git.kernel.org/linus/68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://linux.oracle.com/cve/CVE-2020-0305.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://source.android.com/security/bulletin/pixel/2020-06-01
kernel-headers CVE-2020-0404 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-0404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/68035c80e129c4cfec659aac4180354530b26527
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527
https://linux.oracle.com/cve/CVE-2020-0404.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://source.android.com/security/bulletin/2020-09-01
kernel-headers CVE-2020-0431 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-0431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431
https://git.kernel.org/linus/4f3882177240a1f55e45a3d241d3121341bead78
https://linux.oracle.com/cve/CVE-2020-0431.html
https://linux.oracle.com/errata/ELSA-2021-9086.html
https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/
https://source.android.com/security/bulletin/pixel/2020-09-01
kernel-headers CVE-2020-0465 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-0465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465
https://git.kernel.org/linus/35556bed836f8dc07ac55f69c8d17dce3e7f0e25
https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c
https://linux.oracle.com/cve/CVE-2020-0465.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://source.android.com/security/bulletin/2020-12-01
https://ubuntu.com/security/notices/USN-4912-1
kernel-headers CVE-2020-10135 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/5
https://access.redhat.com/security/cve/CVE-2020-10135
https://bugzilla.suse.com/show_bug.cgi?id=1171988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135
https://francozappa.github.io/about-bias/
https://github.com/marcinguy/CVE-2020-10135-BIAS
https://kb.cert.org/vuls/id/647177/
https://lkml.org/lkml/2020/10/15/98
https://lore.kernel.org/linux-bluetooth/20200520212015.626026-2-luiz.dentz@gmail.com/T/#m3d2012da00716dc280e9725484e8ff1d640d03b5
https://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/
kernel-headers CVE-2020-10732 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-10732
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d
https://github.com/google/kmsan/issues/76
https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a
https://linux.oracle.com/cve/CVE-2020-10732.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://lore.kernel.org/lkml/CAG48ez1u9=Uqcx2dH=7xea1R+WpnL239DSoVHLwV09=FxZUevQ@mail.gmail.com/#t
https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20210129-0005/
https://twitter.com/grsecurity/status/1252558055629299712
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4485-1/
https://www.openwall.com/lists/oss-security/2020/05/06/1
kernel-headers CVE-2020-10742 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-10742
https://bugzilla.redhat.com/show_bug.cgi?id=1835127
https://linux.oracle.com/cve/CVE-2020-10742.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
kernel-headers CVE-2020-10751 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://www.openwall.com/lists/oss-security/2020/05/27/3
https://access.redhat.com/security/cve/CVE-2020-10751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
https://git.kernel.org/linus/fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://linux.oracle.com/cve/CVE-2020-10751.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/04/30/5
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2020-11565 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-11565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://git.kernel.org/linus/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
https://linux.oracle.com/cve/CVE-2020-11565.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11565
https://ubuntu.com/security/notices/USN-4363-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4363-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-12114 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
http://www.openwall.com/lists/oss-security/2020/05/04/2
https://access.redhat.com/security/cve/CVE-2020-12114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4edbe133f851c9e3a2f2a1db367e826b01e72594
https://linux.oracle.com/cve/CVE-2020-12114.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://ubuntu.com/security/notices/USN-4392-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://usn.ubuntu.com/4392-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/05/04/2
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2020-12363 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
kernel-headers CVE-2020-12364 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
kernel-headers CVE-2020-12464 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12464
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=056ad39ee9253873522f6469c3364964a322912b
https://git.kernel.org/linus/056ad39ee9253873522f6469c3364964a322912b (5.7-rc3)
https://github.com/torvalds/linux/commit/056ad39ee9253873522f6469c3364964a322912b
https://linux.oracle.com/cve/CVE-2020-12464.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lkml.org/lkml/2020/3/23/52
https://nvd.nist.gov/vuln/detail/CVE-2020-12464
https://patchwork.kernel.org/patch/11463781/
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
kernel-headers CVE-2020-12770 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
https://git.kernel.org/linus/83c6f2390040f188cc25b270b4befeb5628c1aee (5.7-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
https://linux.oracle.com/cve/CVE-2020-12770.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R54VC7B6MDYKP57AWC2HN7AUJYH62RKI/
https://lkml.org/lkml/2020/4/13/870
https://nvd.nist.gov/vuln/detail/CVE-2020-12770
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4411-1
https://ubuntu.com/security/notices/USN-4412-1
https://ubuntu.com/security/notices/USN-4413-1
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4411-1/
https://usn.ubuntu.com/4412-1/
https://usn.ubuntu.com/4413-1/
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4419-1/
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
kernel-headers CVE-2020-12826 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12826
https://bugzilla.redhat.com/show_bug.cgi?id=1822077
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
https://git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da
https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef
https://linux.oracle.com/cve/CVE-2020-12826.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lists.openwall.net/linux-kernel/2020/03/24/1803
https://nvd.nist.gov/vuln/detail/CVE-2020-12826
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4391-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4391-1/
https://www.openwall.com/lists/kernel-hardening/2020/03/25/1
kernel-headers CVE-2020-13974 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-13974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/b86dab054059b970111b5516ae548efaae5b3aae
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae
https://linux.oracle.com/cve/CVE-2020-13974.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lkml.org/lkml/2020/3/22/482
https://lore.kernel.org/lkml/CAEAjams79+V8bxpcp3UAsU1AnJ+gx2y+ZqhDhjJCpZn2oeZA4Q@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-13974
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
kernel-headers CVE-2020-14305 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-14305
https://bugs.openvz.org/browse/OVZ-7188
https://bugzilla.redhat.com/show_bug.cgi?id=1850716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.9.232&id=396ba2fc4f27ef6c44bbc0098bfddf4da76dc4c9
https://linux.oracle.com/cve/CVE-2020-14305.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://patchwork.ozlabs.org/project/netfilter-devel/patch/c2385b5c-309c-cc64-2e10-a0ef62897502@virtuozzo.com/
https://security.netapp.com/advisory/ntap-20201210-0004/
kernel-headers CVE-2020-14381 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-14381
https://bugzilla.redhat.com/show_bug.cgi?id=1874311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381
https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
https://linux.oracle.com/cve/CVE-2020-14381.html
https://linux.oracle.com/errata/ELSA-2021-9007.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14381
kernel-headers CVE-2020-14416 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-14416
https://bugzilla.suse.com/show_bug.cgi?id=1162002
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd
https://linux.oracle.com/cve/CVE-2020-14416.html
https://linux.oracle.com/errata/ELSA-2020-5801.html
kernel-headers CVE-2020-16166 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-16166
https://arxiv.org/pdf/2012.07432.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/linus/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638
https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://linux.oracle.com/cve/CVE-2020-16166.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/
https://nvd.nist.gov/vuln/detail/CVE-2020-16166
https://security.netapp.com/advisory/ntap-20200814-0004/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2020-1749 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-1749
https://bugzilla.redhat.com/show_bug.cgi?id=1809833
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=6c8991f41546
https://linux.oracle.com/cve/CVE-2020-1749.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://security.netapp.com/advisory/ntap-20201222-0001/
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
kernel-headers CVE-2020-24502 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-24502
https://linux.oracle.com/cve/CVE-2020-24502.html
https://linux.oracle.com/cve/CVE-2020-245024.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
kernel-headers CVE-2020-24503 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-24503
https://linux.oracle.com/cve/CVE-2020-24503.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
kernel-headers CVE-2020-24504 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
kernel-headers CVE-2020-24586 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24586.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
kernel-headers CVE-2020-24587 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24587.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
kernel-headers CVE-2020-24588 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24588
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24588.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
kernel-headers CVE-2020-25284 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://git.kernel.org/linus/f44d04e696feaf13d192d942c4f14ad2e117065a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a
https://linux.oracle.com/cve/CVE-2020-25284.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25284
https://twitter.com/grsecurity/status/1304537507560919041
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
kernel-headers CVE-2020-25285 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-25285
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
https://git.kernel.org/linus/17743798d81238ab13050e8e2833699b54e15467
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467
https://linux.oracle.com/cve/CVE-2020-25285.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25285
https://security.netapp.com/advisory/ntap-20201009-0002/
https://twitter.com/grsecurity/status/1303749848898904067
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://usn.ubuntu.com/4576-1/
https://usn.ubuntu.com/4579-1/
kernel-headers CVE-2020-26139 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26139
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26139.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26140 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26140
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26140.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26141 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26141
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26143 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26143
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26143.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26144 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26144
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26144.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26555 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-26555
https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
kernel-headers CVE-2020-27067 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27067
https://salsa.debian.org/kernel-team/kernel-sec/-/blob/master/retired/CVE-2020-27067
https://source.android.com/security/bulletin/pixel/2020-12-01
kernel-headers CVE-2020-27170 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/24/4
https://access.redhat.com/security/cve/CVE-2020-27170
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76
https://linux.oracle.com/cve/CVE-2020-27170.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2020-27170
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4890-1
https://www.openwall.com/lists/oss-security/2021/03/19/2
kernel-headers CVE-2020-27171 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/24/5
https://access.redhat.com/security/cve/CVE-2020-27171
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899
https://linux.oracle.com/cve/CVE-2020-27171.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2020-27171
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4890-1
https://www.openwall.com/lists/oss-security/2021/03/19/3
kernel-headers CVE-2020-2732 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-2732
https://bugzilla.redhat.com/show_bug.cgi?id=1805135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
https://linux.oracle.com/cve/CVE-2020-2732.html
https://linux.oracle.com/errata/ELSA-2020-5540.html
https://linux.oracle.com/errata/ELSA-2020-5542.html
https://linux.oracle.com/errata/ELSA-2020-5543.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://ubuntu.com/security/notices/USN-4303-1
https://ubuntu.com/security/notices/USN-4303-2
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
https://www.openwall.com/lists/oss-security/2020/02/25/3
https://www.openwall.com/lists/oss-security/2020/02/25/4
https://www.spinics.net/lists/kvm/msg208259.html
kernel-headers CVE-2020-27786 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2020/12/03/1
https://access.redhat.com/security/cve/CVE-2020-27786
https://bugzilla.redhat.com/show_bug.cgi?id=1900933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d
https://linux.oracle.com/cve/CVE-2020-27786.html
https://linux.oracle.com/errata/ELSA-2021-9030.html
https://security.netapp.com/advisory/ntap-20210122-0002/
https://www.openwall.com/lists/oss-security/2020/12/01/1
kernel-headers CVE-2020-27835 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
kernel-headers CVE-2020-28097 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28097
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28097
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://linux.oracle.com/cve/CVE-2020-28097.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://seclists.org/oss-sec/2020/q3/176
https://security.netapp.com/advisory/ntap-20210805-0001/
https://www.openwall.com/lists/oss-security/2020/09/16/1
kernel-headers CVE-2020-28915 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28915
https://bugzilla.suse.com/show_bug.cgi?id=1178886
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
https://linux.oracle.com/cve/CVE-2020-28915.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28915
https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
kernel-headers CVE-2020-28974 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2020/11/25/1
https://access.redhat.com/security/cve/CVE-2020-28974
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974
https://git.kernel.org/linus/3c4e0dff2095c579b142d5a0693257f1c58b4804
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
https://linux.oracle.com/cve/CVE-2020-28974.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28974
https://seclists.org/oss-sec/2020/q4/104
https://security.netapp.com/advisory/ntap-20210108-0003/
https://ubuntu.com/security/notices/USN-4679-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4681-1
https://ubuntu.com/security/notices/USN-4683-1
https://ubuntu.com/security/notices/USN-4751-1
https://www.openwall.com/lists/oss-security/2020/11/09/2
kernel-headers CVE-2020-29374 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2020-29374
https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29374
https://security.netapp.com/advisory/ntap-20210115-0002/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2020-36158 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-36158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d
https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)
https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d
https://linux.oracle.com/cve/CVE-2020-36158.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com
https://nvd.nist.gov/vuln/detail/CVE-2020-36158
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/
https://security.netapp.com/advisory/ntap-20210212-0002/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4879-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.debian.org/security/2021/dsa-4843
kernel-headers CVE-2020-36386 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-36386
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386
https://git.kernel.org/linus/51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://linux.oracle.com/cve/CVE-2020-36386.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt
https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2
https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
kernel-headers CVE-2020-36516 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-36516
https://dl.acm.org/doi/10.1145/3372297.3417884
https://linux.oracle.com/cve/CVE-2020-36516.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://security.netapp.com/advisory/ntap-20220331-0003/
https://www.spinics.net/lists/netdev/msg795642.html
kernel-headers CVE-2020-3702 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-3702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
kernel-headers CVE-2020-4788 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2020/11/20/3
http://www.openwall.com/lists/oss-security/2020/11/23/1
https://access.redhat.com/security/cve/CVE-2020-4788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/189296
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c
https://linux.oracle.com/cve/CVE-2020-4788.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4681-1
https://www.ibm.com/support/pages/node/6370729
https://www.openwall.com/lists/oss-security/2020/11/20/3
kernel-headers CVE-2020-8647 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-8647
https://bugzilla.kernel.org/show_bug.cgi?id=206359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
https://linux.oracle.com/cve/CVE-2020-8647.html
https://linux.oracle.com/errata/ELSA-2020-5691.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8647
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-8648 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.31.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-8648
https://bugzilla.kernel.org/show_bug.cgi?id=206361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
https://linux.oracle.com/cve/CVE-2020-8648.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8648
https://security.netapp.com/advisory/ntap-20200924-0004/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-8649 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-8649
https://bugzilla.kernel.org/show_bug.cgi?id=206357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
https://linux.oracle.com/cve/CVE-2020-8649.html
https://linux.oracle.com/errata/ELSA-2020-5691.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8649
https://usn.ubuntu.com/lsn/0066-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-8694 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8694
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694
https://linux.oracle.com/cve/CVE-2020-8694.html
https://linux.oracle.com/errata/ELSA-2020-5996.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://platypusattack.com/
https://ubuntu.com/security/notices/USN-4626-1
https://ubuntu.com/security/notices/USN-4627-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
kernel-headers CVE-2020-8832 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8832
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8832
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/usn/usn-4302-1
kernel-headers CVE-2020-9383 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html
https://access.redhat.com/security/cve/CVE-2020-9383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
https://git.kernel.org/linus/2e90ca68b0d2f5548804f22f0dd61145516171e3
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530
https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3
https://linux.oracle.com/cve/CVE-2020-9383.html
https://linux.oracle.com/errata/ELSA-2020-5676.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-9383
https://security.netapp.com/advisory/ntap-20200313-0003/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2021-0129 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://linux.oracle.com/cve/CVE-2021-0129.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://security.netapp.com/advisory/ntap-20210716-0002/
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
kernel-headers CVE-2021-0512 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36385.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0512.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3656.json
https://access.redhat.com/security/cve/CVE-2021-0512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512
https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f
https://linux.oracle.com/cve/CVE-2021-0512.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/
https://source.android.com/security/bulletin/2021-06-01
kernel-headers CVE-2021-20219 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20219
https://bugzilla.redhat.com/show_bug.cgi?id=1923738
https://linux.oracle.com/cve/CVE-2021-20219.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
kernel-headers CVE-2021-20261 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20261
https://bugzilla.redhat.com/show_bug.cgi?id=1932150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261
https://git.kernel.org/linus/a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://linux.oracle.com/cve/CVE-2021-20261.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
https://ubuntu.com/security/notices/USN-4904-1
kernel-headers CVE-2021-20317 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json
https://access.redhat.com/security/cve/CVE-2021-20317
https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-20320 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
kernel-headers CVE-2021-20321 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20321
https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-20321
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-20322 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20322
https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://linux.oracle.com/cve/CVE-2021-20322.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20322
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-23133 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/10/1
http://www.openwall.com/lists/oss-security/2021/05/10/2
http://www.openwall.com/lists/oss-security/2021/05/10/3
http://www.openwall.com/lists/oss-security/2021/05/10/4
https://access.redhat.com/security/cve/CVE-2021-23133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://linux.oracle.com/cve/CVE-2021-23133.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-23133
https://security.netapp.com/advisory/ntap-20210611-0008/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/04/18/2
kernel-headers CVE-2021-28711 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
kernel-headers CVE-2021-28712 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
kernel-headers CVE-2021-28713 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
kernel-headers CVE-2021-28964 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://linux.oracle.com/cve/CVE-2021-28964.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28964
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
kernel-headers CVE-2021-28972 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-28972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28972
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
kernel-headers CVE-2021-29155 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-29155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155
https://linux.oracle.com/cve/CVE-2021-29155.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-29155
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4999-1
https://www.kernel.org
https://www.openwall.com/lists/oss-security/2021/04/18/4
kernel-headers CVE-2021-30002 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-30002
https://bugzilla.suse.com/show_bug.cgi?id=1184120
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-30002
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4947-1
https://ubuntu.com/security/notices/USN-4984-1
kernel-headers CVE-2021-3178 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/
https://nvd.nist.gov/vuln/detail/CVE-2021-3178
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4910-1
https://ubuntu.com/security/notices/USN-4912-1
kernel-headers CVE-2021-31829 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/04/4
https://access.redhat.com/security/cve/CVE-2021-31829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31829
https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f
https://linux.oracle.com/cve/CVE-2021-31829.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWCZ6LJLENL2C3URW5ICARTACXPFCFN2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4X2G5YAPYJGI3PFEZZNOTRYI33GOCCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZI7OBCJQDNWMKLBP6MZ5NV4EUTDAMX6Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-31829
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.openwall.com/lists/oss-security/2021/05/04/4
kernel-headers CVE-2021-33098 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098
https://security.netapp.com/advisory/ntap-20211210-0005/
https://ubuntu.com/security/notices/USN-5343-1
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
kernel-headers CVE-2021-33150 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33150
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html
kernel-headers CVE-2021-33200 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e
https://linux.oracle.com/cve/CVE-2021-33200.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/
https://nvd.nist.gov/vuln/detail/CVE-2021-33200
https://security.netapp.com/advisory/ntap-20210706-0004/
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.openwall.com/lists/oss-security/2021/05/27/1
kernel-headers CVE-2021-33624 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1
https://access.redhat.com/security/cve/CVE-2021-33624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e
https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33624
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5115-1
https://www.openwall.com/lists/oss-security/2021/06/21/1
https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
kernel-headers CVE-2021-34556 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3
https://access.redhat.com/security/cve/CVE-2021-34556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-34556
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
kernel-headers CVE-2021-34693 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1
https://access.redhat.com/security/cve/CVE-2021-34693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
https://linux.oracle.com/cve/CVE-2021-34693.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-34693
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/06/15/1
kernel-headers CVE-2021-34866 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-34866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://security.netapp.com/advisory/ntap-20220217-0008/
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
kernel-headers CVE-2021-34981 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
kernel-headers CVE-2021-35477 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-35477
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/01/3
kernel-headers CVE-2021-3564 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1
http://www.openwall.com/lists/oss-security/2021/06/01/2
https://access.redhat.com/security/cve/CVE-2021-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1964139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
https://linux.oracle.com/cve/CVE-2021-3564.html
https://linux.oracle.com/errata/ELSA-2022-0620.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3564
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/05/25/1
kernel-headers CVE-2021-3573 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3573
https://bugzilla.redhat.com/show_bug.cgi?id=1966578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
https://linux.oracle.com/cve/CVE-2021-3573.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3573
https://ubuntu.com/security/notices/USN-5015-1
https://ubuntu.com/security/notices/USN-5044-1
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.openwall.com/lists/oss-security/2021/06/08/2
kernel-headers CVE-2021-3600 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://linux.oracle.com/cve/CVE-2021-3600.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lore.kernel.org/patchwork/patch/1379497/
https://ubuntu.com/security/notices/USN-5003-1
https://www.openwall.com/lists/oss-security/2021/06/23/1
kernel-headers CVE-2021-3609 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22543.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22555.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3609.json
https://access.redhat.com/security/cve/CVE-2021-3609
https://bugzilla.redhat.com/show_bug.cgi?id=1971651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md
https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463
https://linux.oracle.com/cve/CVE-2021-3609.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t
https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-3609
https://security.netapp.com/advisory/ntap-20220419-0004/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5002-1
https://ubuntu.com/security/notices/USN-5003-1
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/06/19/1
kernel-headers CVE-2021-3612 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3612
https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3612.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u
https://security.netapp.com/advisory/ntap-20210805-0005/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
kernel-headers CVE-2021-3640 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3640
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux.oracle.com/cve/CVE-2021-3640.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
https://security.netapp.com/advisory/ntap-20220419-0003/
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
kernel-headers CVE-2021-3653 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.45.1.el7
Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
https://access.redhat.com/security/cve/CVE-2021-3653
https://bugzilla.redhat.com/show_bug.cgi?id=1983686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
https://github.com/torvalds/linux/commit/3d6368ef580a
https://linux.oracle.com/cve/CVE-2021-3653.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3653
https://ubuntu.com/security/notices/USN-5062-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
kernel-headers CVE-2021-3655 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3655
https://bugzilla.redhat.com/show_bug.cgi?id=1984024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f
https://linux.oracle.com/cve/CVE-2021-3655.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/
https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-3655
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
kernel-headers CVE-2021-3656 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.45.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36385.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0512.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3656.json
https://access.redhat.com/security/cve/CVE-2021-3656
https://bugzilla.redhat.com/show_bug.cgi?id=1983988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://github.com/torvalds/linux/commit/89c8a4984fc9
https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
https://linux.oracle.com/cve/CVE-2021-3656.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3656
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
kernel-headers CVE-2021-3669 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
kernel-headers CVE-2021-3714 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3714
https://arxiv.org/abs/2111.08553
https://arxiv.org/pdf/2111.08553.pdf
kernel-headers CVE-2021-3715 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3715
https://bugzilla.redhat.com/show_bug.cgi?id=1993988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715
https://git.kernel.org/linus/ef299cc3fa1a9e1288665a9fdc8bff55629fd359 (5.6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359
https://github.com/torvalds/linux/commit/ef299cc3fa1a9e1288665a9fdc8bff55629fd359
https://linux.oracle.com/cve/CVE-2021-3715.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://www.openwall.com/lists/oss-security/2021/09/07/1
kernel-headers CVE-2021-37159 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-37159
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.spinics.net/lists/linux-usb/msg202228.html
kernel-headers CVE-2021-3744 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/security/cve/CVE-2021-3744
https://bugzilla.redhat.com/show_bug.cgi?id=2000627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3744
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-3752 MEDIUM 3.10.0-1062.7.1.el7 3.10.0-1160.59.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3752
https://bugzilla.redhat.com/show_bug.cgi?id=1999544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3752.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-3752
https://security.netapp.com/advisory/ntap-20220318-0009/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/4
kernel-headers CVE-2021-3753 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3753
https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://linux.oracle.com/cve/CVE-2021-3753.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/09/01/4
kernel-headers CVE-2021-3764 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://linux.oracle.com/cve/CVE-2021-3764.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
kernel-headers CVE-2021-3772 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-3773 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3773
https://bugzilla.redhat.com/show_bug.cgi?id=2004949
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3773.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3773
kernel-headers CVE-2021-39636 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-39636
https://android.googlesource.com/kernel/common/+/823f05d71506017aa4d47ae8b9546081686098fe
https://android.googlesource.com/kernel/common/+/8a1b3c7bd71ef1e7a4537216858dbe7d13eec6ed
https://android.googlesource.com/kernel/common/+/bb5bc03a5056b4b22f00b7333c42c861b83ef19f
https://android.googlesource.com/kernel/common/+/d104670ce30b9f910f39fbaad3ec59f87fa43468
https://android.googlesource.com/kernel/common/+/dcd0c8c3e87cf08344e169fdb94eb7ec96c3c32a
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636
https://source.android.com/security/bulletin/pixel/2021-12-01
https://ubuntu.com/security/notices/USN-5361-1
kernel-headers CVE-2021-39713 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
https://access.redhat.com/security/cve/CVE-2021-39713
https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
https://android.googlesource.com/kernel/common/+/6f99528e97977
https://android.googlesource.com/kernel/common/+/86bd446b5cebd
https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://source.android.com/security/bulletin/pixel/2022-03-01
https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5484-1
kernel-headers CVE-2021-4002 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-4002
https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://linux.oracle.com/cve/CVE-2021-4002.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4002
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
kernel-headers CVE-2021-4032 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4032
https://bugzilla.redhat.com/show_bug.cgi?id=2027403
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee
https://lkml.org/lkml/2021/9/8/587
https://nvd.nist.gov/vuln/detail/CVE-2021-4032
kernel-headers CVE-2021-40490 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-40490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-40490
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2021/dsa-4978
kernel-headers CVE-2021-4148 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
kernel-headers CVE-2021-4149 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4149
https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://linux.oracle.com/cve/CVE-2021-4149.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
https://nvd.nist.gov/vuln/detail/CVE-2021-4149
https://ubuntu.com/security/notices/USN-5466-1
kernel-headers CVE-2021-4157 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4157
https://bugzilla.redhat.com/show_bug.cgi?id=2034342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)
https://linux.oracle.com/cve/CVE-2021-4157.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-4157
https://security.netapp.com/advisory/ntap-20220602-0007/
https://ubuntu.com/security/notices/USN-5413-1
kernel-headers CVE-2021-4159 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
kernel-headers CVE-2021-41864 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-41864
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-4203 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4203
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://linux.oracle.com/cve/CVE-2021-4203.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4203
kernel-headers CVE-2021-4204 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
https://ubuntu.com/security/notices/USN-5217-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5219-1
https://www.openwall.com/lists/oss-security/2022/01/11/4
kernel-headers CVE-2021-43056 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://access.redhat.com/security/cve/CVE-2021-43056
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://linux.oracle.com/cve/CVE-2021-43056.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
kernel-headers CVE-2021-43975 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-43975
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-43976 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://linux.oracle.com/cve/CVE-2021-43976.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://nvd.nist.gov/vuln/detail/CVE-2021-43976
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5361-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2021-45485 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-45485
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
https://linux.oracle.com/cve/CVE-2021-45485.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/
https://nvd.nist.gov/vuln/detail/CVE-2021-45485
https://security.netapp.com/advisory/ntap-20220121-0001/
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
kernel-headers CVE-2021-45486 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-45486
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba
https://linux.oracle.com/cve/CVE-2021-45486.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45486
https://ubuntu.com/security/notices/USN-5361-1
kernel-headers CVE-2021-45868 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-45868
https://bugzilla.kernel.org/show_bug.cgi?id=214655
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868
https://git.kernel.org/linus/9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://linux.oracle.com/cve/CVE-2021-45868.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45868
https://security.netapp.com/advisory/ntap-20220419-0003/
https://www.openwall.com/lists/oss-security/2022/03/17/1
https://www.openwall.com/lists/oss-security/2022/03/17/2
kernel-headers CVE-2022-0480 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
kernel-headers CVE-2022-0494 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
kernel-headers CVE-2022-0617 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/04/13/2
https://access.redhat.com/security/cve/CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://linux.oracle.com/cve/CVE-2022-0617.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-0617
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2022-0812 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0812
https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
https://twitter.com/iMilnb/status/1497125078252806161
kernel-headers CVE-2022-0850 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0850
https://bugzilla.redhat.com/show_bug.cgi?id=2060606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
kernel-headers CVE-2022-0854 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
kernel-headers CVE-2022-1011 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5467-1
kernel-headers CVE-2022-1016 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/security/cve/CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://linux.oracle.com/cve/CVE-2022-1016.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5466-1
https://www.openwall.com/lists/oss-security/2022/03/28/5
kernel-headers CVE-2022-1158 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
https://linux.oracle.com/cve/CVE-2022-1158.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://seclists.org/oss-sec/2022/q2/22
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
kernel-headers CVE-2022-1280 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1280
https://bugzilla.redhat.com/show_bug.cgi?id=2071022
https://www.openwall.com/lists/oss-security/2022/04/12/3
kernel-headers CVE-2022-1353 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1353
https://bugzilla.redhat.com/show_bug.cgi?id=2066819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://git.kernel.org/linus/9a564bccb78a76740ea9d75a259942df8143d02c (5.17)
https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c
https://linux.oracle.com/cve/CVE-2022-1353.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1353
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
kernel-headers CVE-2022-1652 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
https://bugzilla.redhat.com/show_bug.cgi?id=1832397
https://bugzilla.redhat.com/show_bug.cgi?id=2084458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
https://francozappa.github.io/about-bias/
https://kb.cert.org/vuls/id/647177/
https://nvd.nist.gov/vuln/detail/CVE-2022-1652
https://www.openwall.com/lists/oss-security/2022/05/10/1
https://www.openwall.com/lists/oss-security/2022/05/10/2
kernel-headers CVE-2022-1678 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1678
https://anas.openanolis.cn/cves/detail/CVE-2022-1678
https://anas.openanolis.cn/errata/detail/ANSA-2022:0143
https://bugzilla.openanolis.cn/show_bug.cgi?id=61
https://gitee.com/anolis/cloud-kernel/commit/bed537da691b
https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a
https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/
kernel-headers CVE-2022-1679 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1679
https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
kernel-headers CVE-2022-1729 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704
https://linux.oracle.com/cve/CVE-2022-1729.html
https://linux.oracle.com/errata/ELSA-2022-9413.html
https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u
https://www.openwall.com/lists/oss-security/2022/05/20/2
kernel-headers CVE-2022-1734 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4
http://www.openwall.com/lists/oss-security/2022/06/09/1
https://access.redhat.com/security/cve/CVE-2022-1734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
https://ubuntu.com/security/notices/USN-5471-1
kernel-headers CVE-2022-1972 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=fecf31ee395b0295f2d7260aa29946b7605f7c85
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.openwall.com/lists/oss-security/2022/06/02/1
kernel-headers CVE-2022-1976 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1976
kernel-headers CVE-2022-21499 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
https://linux.oracle.com/cve/CVE-2022-21499.html
https://linux.oracle.com/errata/ELSA-2022-9496.html
https://ubuntu.com/security/notices/USN-5465-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://ubuntu.com/security/notices/USN-5484-1
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/10
https://www.openwall.com/lists/oss-security/2022/05/24/7
kernel-headers CVE-2022-2153 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2153
https://www.openwall.com/lists/oss-security/2022/06/22/1
kernel-headers CVE-2022-23222 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/14/1
http://www.openwall.com/lists/oss-security/2022/01/18/2
http://www.openwall.com/lists/oss-security/2022/06/01/1
http://www.openwall.com/lists/oss-security/2022/06/04/3
http://www.openwall.com/lists/oss-security/2022/06/07/3
https://access.redhat.com/security/cve/CVE-2022-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/
https://nvd.nist.gov/vuln/detail/CVE-2022-23222
https://security.netapp.com/advisory/ntap-20220217-0002/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5362-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.debian.org/security/2022/dsa-5050
https://www.openwall.com/lists/oss-security/2022/01/13/1
kernel-headers CVE-2022-25265 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-25265
https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://nvd.nist.gov/vuln/detail/CVE-2022-25265
https://security.netapp.com/advisory/ntap-20220318-0005/
kernel-headers CVE-2022-25375 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://access.redhat.com/security/cve/CVE-2022-25375
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25375
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
kernel-headers CVE-2022-28356 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1
https://access.redhat.com/security/cve/CVE-2022-28356
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a
https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a
https://nvd.nist.gov/vuln/detail/CVE-2022-28356
https://security.netapp.com/advisory/ntap-20220506-0006/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/04/06/1
kernel-headers CVE-2022-28388 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
kernel-headers CVE-2022-28389 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1)
https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28389
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
kernel-headers CVE-2022-28390 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
kernel-headers CVE-2022-28796 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-28796
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e
https://nvd.nist.gov/vuln/detail/CVE-2022-28796
https://security.netapp.com/advisory/ntap-20220506-0006/
kernel-headers CVE-2022-28893 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://security.netapp.com/advisory/ntap-20220526-0002/
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
kernel-headers CVE-2022-29581 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://nvd.nist.gov/vuln/detail/CVE-2022-29581
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5444-1
kernel-headers CVE-2022-30594 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5465-1
kernel-headers CVE-2022-32981 MEDIUM 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2022/06/14/3
https://access.redhat.com/security/cve/CVE-2022-32981
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e1278444446fc97778a5e5c99bca1ce0bbc5ec9
kernel-headers CVE-2022-33981 MEDIUM 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-33981
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6
https://exchange.xforce.ibmcloud.com/vulnerabilities/225362
https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf
https://seclists.org/oss-sec/2022/q2/66
kernel-headers CVE-2014-0131 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://www.openwall.com/lists/oss-security/2014/03/10/4
http://www.spinics.net/lists/netdev/msg274250.html
http://www.spinics.net/lists/netdev/msg274316.html
https://access.redhat.com/security/cve/CVE-2014-0131
https://bugzilla.redhat.com/show_bug.cgi?id=1074589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131
https://github.com/torvalds/linux/commit/1fd819ecb90cc9b822cd84d3056ddba315d3340f
https://ubuntu.com/security/notices/USN-2283-1
https://ubuntu.com/security/notices/USN-2284-1
https://ubuntu.com/security/notices/USN-2285-1
https://ubuntu.com/security/notices/USN-2286-1
https://ubuntu.com/security/notices/USN-2287-1
https://ubuntu.com/security/notices/USN-2289-1
kernel-headers CVE-2014-2038 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=263b4509ec4d47e0da3e753f85a39ea12d1eff24
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.3
http://www.openwall.com/lists/oss-security/2014/02/20/16
http://www.ubuntu.com/usn/USN-2137-1
http://www.ubuntu.com/usn/USN-2140-1
https://access.redhat.com/security/cve/CVE-2014-2038
https://bugzilla.redhat.com/show_bug.cgi?id=1066939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038
https://git.kernel.org/linus/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://github.com/torvalds/linux/commit/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://ubuntu.com/security/notices/USN-2137-1
https://ubuntu.com/security/notices/USN-2140-1
kernel-headers CVE-2014-8181 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2014-8181
https://bugzilla.redhat.com/show_bug.cgi?id=1335817
kernel-headers CVE-2014-9731 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/03/4
http://www.securityfocus.com/bid/75001
https://access.redhat.com/security/cve/CVE-2014-9731
https://bugzilla.redhat.com/show_bug.cgi?id=1228220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731
https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
kernel-headers CVE-2015-1142857 LOW 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2015/q4/425
https://access.redhat.com/security/cve/CVE-2015-1142857
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00046&languageid=en-fr
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-smolyar.pdf
kernel-headers CVE-2015-1350 LOW 3.10.0-1062.7.1.el7
Expand...http://marc.info/?l=linux-kernel&m=142153722930533&w=2
http://www.openwall.com/lists/oss-security/2015/01/24/5
http://www.securityfocus.com/bid/76075
https://access.redhat.com/security/cve/CVE-2015-1350
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492
https://bugzilla.redhat.com/show_bug.cgi?id=1185139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-4904-1
kernel-headers CVE-2015-1420 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
http://www.debian.org/security/2015/dsa-3170
http://www.openwall.com/lists/oss-security/2015/01/29/12
http://www.securityfocus.com/bid/72357
http://www.ubuntu.com/usn/USN-2660-1
http://www.ubuntu.com/usn/USN-2661-1
http://www.ubuntu.com/usn/USN-2665-1
http://www.ubuntu.com/usn/USN-2667-1
https://access.redhat.com/security/cve/CVE-2015-1420
https://bugzilla.redhat.com/show_bug.cgi?id=1187534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420
https://linux.oracle.com/cve/CVE-2015-1420.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://ubuntu.com/security/notices/USN-2660-1
https://ubuntu.com/security/notices/USN-2661-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2665-1
https://ubuntu.com/security/notices/USN-2666-1
https://ubuntu.com/security/notices/USN-2667-1
kernel-headers CVE-2015-2877 LOW 3.10.0-1062.7.1.el7
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://access.redhat.com/security/cve/CVE-2015-2877
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
kernel-headers CVE-2015-3291 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/22/7
http://www.securityfocus.com/bid/76003
http://www.ubuntu.com/usn/USN-2687-1
http://www.ubuntu.com/usn/USN-2688-1
http://www.ubuntu.com/usn/USN-2689-1
http://www.ubuntu.com/usn/USN-2690-1
http://www.ubuntu.com/usn/USN-2691-1
https://access.redhat.com/security/cve/CVE-2015-3291
https://bugzilla.redhat.com/show_bug.cgi?id=1243489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a27507ca2d796cfa8d907de31ad730359c8a6d06 (prerequisite)
https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492dba2d
https://security-tracker.debian.org/tracker/CVE-2015-3291
https://ubuntu.com/security/notices/USN-2687-1
https://ubuntu.com/security/notices/USN-2688-1
https://ubuntu.com/security/notices/USN-2689-1
https://ubuntu.com/security/notices/USN-2690-1
https://ubuntu.com/security/notices/USN-2691-1
https://ubuntu.com/security/notices/USN-2700-1
https://ubuntu.com/security/notices/USN-2701-1
kernel-headers CVE-2015-5257 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4
http://www.debian.org/security/2015/dsa-3372
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
http://www.openwall.com/lists/oss-security/2015/09/23/1
http://www.securityfocus.com/bid/76834
http://www.ubuntu.com/usn/USN-2792-1
http://www.ubuntu.com/usn/USN-2794-1
http://www.ubuntu.com/usn/USN-2795-1
http://www.ubuntu.com/usn/USN-2798-1
http://www.ubuntu.com/usn/USN-2799-1
https://access.redhat.com/security/cve/CVE-2015-5257
https://bugzilla.redhat.com/show_bug.cgi?id=1265607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5257
https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4
https://linux.oracle.com/cve/CVE-2015-5257.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://marc.info/?l=linux-usb&m=144303376328355
https://ubuntu.com/security/notices/USN-2792-1
https://ubuntu.com/security/notices/USN-2794-1
https://ubuntu.com/security/notices/USN-2795-1
https://ubuntu.com/security/notices/USN-2796-1
https://ubuntu.com/security/notices/USN-2797-1
https://ubuntu.com/security/notices/USN-2798-1
https://ubuntu.com/security/notices/USN-2799-1
kernel-headers CVE-2015-5697 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://www.debian.org/security/2015/dsa-3329
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/28/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/76066
http://www.securitytracker.com/id/1033211
http://www.ubuntu.com/usn/USN-2731-1
http://www.ubuntu.com/usn/USN-2732-1
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-5697
https://bugzilla.redhat.com/show_bug.cgi?id=1249011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5697
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4
https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16
https://linux.oracle.com/cve/CVE-2015-5697.html
https://linux.oracle.com/errata/ELSA-2015-3068.html
https://ubuntu.com/security/notices/USN-2731-1
https://ubuntu.com/security/notices/USN-2732-1
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2777-1
kernel-headers CVE-2015-6252 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3364
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.5
http://www.openwall.com/lists/oss-security/2015/08/18/3
http://www.securityfocus.com/bid/76400
http://www.securitytracker.com/id/1033666
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-6252
https://bugzilla.redhat.com/show_bug.cgi?id=1251839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252
https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
https://linux.oracle.com/cve/CVE-2015-6252.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://lkml.org/lkml/2015/8/10/375
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
https://ubuntu.com/security/notices/USN-2777-1
kernel-headers CVE-2015-7515 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84288
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2015-7515
https://bugzilla.redhat.com/show_bug.cgi?id=1285326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
https://os-s.net/advisories/OSS-2016-05_aiptek.pdf
https://security-tracker.debian.org/tracker/CVE-2015-7515
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://www.exploit-db.com/exploits/39544/
kernel-headers CVE-2015-7566 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145260786729359&w=2
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.securityfocus.com/archive/1/537733/100/0/threaded
http://www.securityfocus.com/bid/82975
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7566
https://bugzilla.redhat.com/show_bug.cgi?id=1283371
https://bugzilla.redhat.com/show_bug.cgi?id=1296466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566
https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
https://security-tracker.debian.org/tracker/CVE-2015-7566
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.exploit-db.com/exploits/39540/
kernel-headers CVE-2015-7799 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
http://www.debian.org/security/2015/dsa-3426
http://www.openwall.com/lists/oss-security/2015/10/09/1
http://www.openwall.com/lists/oss-security/2015/10/10/3
http://www.securityfocus.com/bid/77033
http://www.securitytracker.com/id/1033809
http://www.ubuntu.com/usn/USN-2841-1
http://www.ubuntu.com/usn/USN-2841-2
http://www.ubuntu.com/usn/USN-2842-1
http://www.ubuntu.com/usn/USN-2842-2
http://www.ubuntu.com/usn/USN-2843-1
http://www.ubuntu.com/usn/USN-2843-2
http://www.ubuntu.com/usn/USN-2843-3
http://www.ubuntu.com/usn/USN-2844-1
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-7799
https://bugzilla.redhat.com/show_bug.cgi?id=1271134
https://code.google.com/p/android/issues/detail?id=187973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
https://ubuntu.com/security/notices/USN-2841-1
https://ubuntu.com/security/notices/USN-2841-2
https://ubuntu.com/security/notices/USN-2842-1
https://ubuntu.com/security/notices/USN-2842-2
https://ubuntu.com/security/notices/USN-2843-1
https://ubuntu.com/security/notices/USN-2843-2
https://ubuntu.com/security/notices/USN-2843-3
https://ubuntu.com/security/notices/USN-2844-1
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
kernel-headers CVE-2015-7833 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/bugtraq/2015/Oct/35
http://www.debian.org/security/2015/dsa-3396
http://www.debian.org/security/2015/dsa-3426
http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf
http://www.securityfocus.com/archive/1/536629
http://www.securityfocus.com/bid/77030
http://www.securitytracker.com/id/1034452
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7833
https://bugzilla.redhat.com/show_bug.cgi?id=1201858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2015-8569 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://twitter.com/grsecurity/statuses/676744240802750464
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2015/12/15/11
http://www.openwall.com/lists/oss-security/2015/12/15/7
http://www.securityfocus.com/bid/79428
http://www.securitytracker.com/id/1034549
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8569
https://bugzilla.redhat.com/show_bug.cgi?id=1292045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
https://linux.oracle.com/cve/CVE-2015-8569.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://lkml.org/lkml/2015/12/14/252
https://twitter.com/grsecurity/status/676744240802750464
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
kernel-headers CVE-2015-8575 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.openwall.com/lists/oss-security/2015/12/16/3
http://www.securityfocus.com/bid/79724
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8575
https://bugzilla.redhat.com/show_bug.cgi?id=1292840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
https://github.com/torvalds/linux/commit/5233252fce714053f0151680933571a2da9cbfb4
https://linux.oracle.com/cve/CVE-2015-8575.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
kernel-headers CVE-2015-8785 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ca8138f014a913f98e6ef40e939868e1e9ea876
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/01/24/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/81688
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-8785
https://bugzilla.redhat.com/show_bug.cgi?id=1290642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785
https://github.com/torvalds/linux/commit/3ca8138f014a913f98e6ef40e939868e1e9ea876
https://linux.oracle.com/cve/CVE-2015-8785.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2908-1
https://ubuntu.com/security/notices/USN-2908-2
https://ubuntu.com/security/notices/USN-2908-3
https://ubuntu.com/security/notices/USN-2909-1
https://ubuntu.com/security/notices/USN-2910-1
kernel-headers CVE-2015-8816 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5
http://www.openwall.com/lists/oss-security/2016/02/23/5
http://www.openwall.com/lists/oss-security/2016/02/24/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/83363
http://www.spinics.net/lists/linux-usb/msg132311.html
https://access.redhat.com/security/cve/CVE-2015-8816
https://bugzilla.redhat.com/show_bug.cgi?id=1311589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
https://linux.oracle.com/cve/CVE-2015-8816.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
kernel-headers CVE-2015-8964 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc
http://source.android.com/security/bulletin/2016-11-01.html
http://www.securityfocus.com/bid/94138
https://access.redhat.com/security/cve/CVE-2015-8964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964
https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc
https://ubuntu.com/security/notices/USN-3161-1
https://ubuntu.com/security/notices/USN-3161-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
kernel-headers CVE-2016-0823 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
http://source.android.com/security/bulletin/2016-03-01.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3
http://www.securityfocus.com/bid/84265
https://access.redhat.com/security/cve/CVE-2016-0823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823
https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
kernel-headers CVE-2016-2184 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/102
http://seclists.org/bugtraq/2016/Mar/88
http://seclists.org/bugtraq/2016/Mar/89
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84340
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2184
https://bugzilla.redhat.com/show_bug.cgi?id=1317012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.exploit-db.com/exploits/39555/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
kernel-headers CVE-2016-2185 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/116
http://seclists.org/bugtraq/2016/Mar/90
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84341
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2185
https://bugzilla.redhat.com/show_bug.cgi?id=1283362
https://bugzilla.redhat.com/show_bug.cgi?id=1283363
https://bugzilla.redhat.com/show_bug.cgi?id=1317014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
kernel-headers CVE-2016-2186 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796479528669&w=2
http://seclists.org/bugtraq/2016/Mar/117
http://seclists.org/bugtraq/2016/Mar/85
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84337
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2186
https://bugzilla.redhat.com/show_bug.cgi?id=1317015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
kernel-headers CVE-2016-2187 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/85425
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-2187
https://bugzilla.redhat.com/show_bug.cgi?id=1317017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
kernel-headers CVE-2016-2188 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ec0ef3a82125efc36173062a50624550a900ae0
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796659429788&w=2
http://seclists.org/bugtraq/2016/Mar/118
http://seclists.org/bugtraq/2016/Mar/87
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2188
https://bugzilla.redhat.com/show_bug.cgi?id=1317018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188
https://github.com/torvalds/linux/commit/4ec0ef3a82125efc36173062a50624550a900ae0
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.exploit-db.com/exploits/39556/
kernel-headers CVE-2016-2543 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=030e2c78d3a91dd0d27fef37e91950dde333eba1
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83377
http://www.securitytracker.com/id/1035304
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2543
https://bugzilla.redhat.com/show_bug.cgi?id=1311554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
https://github.com/torvalds/linux/commit/030e2c78d3a91dd0d27fef37e91950dde333eba1
https://linux.oracle.com/cve/CVE-2016-2543.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/215
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-2544 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83380
http://www.securitytracker.com/id/1035305
http://www.spinics.net/lists/alsa-devel/msg45102.html
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2544
https://bugzilla.redhat.com/show_bug.cgi?id=1311558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544
https://github.com/torvalds/linux/commit/3567eb6af614dac436c4b16a8d426f9faed639b3
https://linux.oracle.com/cve/CVE-2016-2544.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/465
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-2545 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee8413b01045c74340aa13ad5bdf905de32be736
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83381
http://www.securitytracker.com/id/1035296
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2545
https://bugzilla.redhat.com/show_bug.cgi?id=1311560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545
https://github.com/torvalds/linux/commit/ee8413b01045c74340aa13ad5bdf905de32be736
https://linux.oracle.com/cve/CVE-2016-2545.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-2549 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83382
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2549
https://bugzilla.redhat.com/show_bug.cgi?id=1311570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
https://github.com/torvalds/linux/commit/2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
https://linux.oracle.com/cve/CVE-2016-2549.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
kernel-headers CVE-2016-2782 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.openwall.com/lists/oss-security/2016/02/28/9
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2782
https://bugzilla.redhat.com/show_bug.cgi?id=1312670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782
https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
https://linux.oracle.com/cve/CVE-2016-2782.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.exploit-db.com/exploits/39539/
kernel-headers CVE-2016-3136 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e9a0b05257f29cf4b75f3209243ed71614d062e
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/bugtraq/2016/Mar/57
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/2
http://www.securityfocus.com/bid/84299
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3136
https://bugzilla.redhat.com/show_bug.cgi?id=1283370
https://bugzilla.redhat.com/show_bug.cgi?id=1317007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
https://github.com/torvalds/linux/commit/4e9a0b05257f29cf4b75f3209243ed71614d062e
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.exploit-db.com/exploits/39541/
kernel-headers CVE-2016-3137 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/55
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/3
http://www.securityfocus.com/bid/84300
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3137
https://bugzilla.redhat.com/show_bug.cgi?id=1283368
https://bugzilla.redhat.com/show_bug.cgi?id=1316996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
kernel-headers CVE-2016-3138 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/54
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/4
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-3138
https://bugzilla.redhat.com/show_bug.cgi?id=1283366
https://bugzilla.redhat.com/show_bug.cgi?id=1316204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
https://github.com/torvalds/linux/commit/8835ba4a39cf53f705417b3b3a94eb067673f2c9
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
kernel-headers CVE-2016-3139 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=471d17148c8b4174ac5f5283a73316d12c4379bc
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
https://access.redhat.com/security/cve/CVE-2016-3139
https://bugzilla.redhat.com/show_bug.cgi?id=1283375
https://bugzilla.redhat.com/show_bug.cgi?id=1283377
https://bugzilla.redhat.com/show_bug.cgi?id=1316993
https://github.com/torvalds/linux/commit/471d17148c8b4174ac5f5283a73316d12c4379bc
https://linux.oracle.com/cve/CVE-2016-3139.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://security-tracker.debian.org/tracker/CVE-2016-3139
https://www.exploit-db.com/exploits/39538/
kernel-headers CVE-2016-3140 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/61
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/6
http://www.securityfocus.com/bid/84304
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3140
https://bugzilla.redhat.com/show_bug.cgi?id=1283378
https://bugzilla.redhat.com/show_bug.cgi?id=1316995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
https://linux.oracle.com/cve/CVE-2016-3140.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.exploit-db.com/exploits/39537/
kernel-headers CVE-2016-3689 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/30/6
http://www.securitytracker.com/id/1035441
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3689
https://bugzilla.novell.com/show_bug.cgi?id=971628
https://bugzilla.redhat.com/show_bug.cgi?id=1320060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689
https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-3000-1
kernel-headers CVE-2016-3695 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102327
https://access.redhat.com/security/cve/CVE-2016-3695
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
kernel-headers CVE-2016-3951 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/oss-sec/2016/q2/19
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/04/06/4
http://www.securityfocus.com/bid/91028
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-3951
https://bugzilla.novell.com/show_bug.cgi?id=974418
https://bugzilla.redhat.com/show_bug.cgi?id=1324782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b
https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274
https://linux.oracle.com/cve/CVE-2016-3951.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.spinics.net/lists/netdev/msg367669.html
kernel-headers CVE-2016-4482 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/05/04/2
http://www.openwall.com/lists/oss-security/2016/05/04/6
http://www.securityfocus.com/bid/90029
http://www.spinics.net/lists/linux-usb/msg140243.html
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4482
https://bugzilla.redhat.com/show_bug.cgi?id=1332931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
https://git.kernel.org/cgit/linux/kernel/git/gregkh/usb.git/commit/?h=usb-next&id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://linux.oracle.com/cve/CVE-2016-4482.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
kernel-headers CVE-2016-4486 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/04/27
http://www.openwall.com/lists/oss-security/2016/05/05/2
http://www.securityfocus.com/bid/90051
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-4486
https://bugzilla.redhat.com/show_bug.cgi?id=1333316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
https://www.exploit-db.com/exploits/46006/
kernel-headers CVE-2016-4580 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/10/12
http://www.securityfocus.com/bid/90528
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8
https://linux.oracle.com/cve/CVE-2016-4580.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
kernel-headers CVE-2016-4805 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/oss-sec/2016/q2/346
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
http://www.openwall.com/lists/oss-security/2016/05/15/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/90605
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4805
https://bugzilla.redhat.com/show_bug.cgi?id=1335803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
https://linux.oracle.com/cve/CVE-2016-4805.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
kernel-headers CVE-2016-6130 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6
http://www.debian.org/security/2016/dsa-3616
http://www.securityfocus.com/archive/1/538803/30/0/threaded
http://www.securityfocus.com/bid/91540
https://access.redhat.com/security/cve/CVE-2016-6130
https://bugzilla.kernel.org/show_bug.cgi?id=116741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130
https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6
https://ubuntu.com/security/notices/USN-3099-1
kernel-headers CVE-2016-7425 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
http://marc.info/?l=linux-scsi&m=147394713328707&w=2
http://marc.info/?l=linux-scsi&m=147394796228991&w=2
http://www.openwall.com/lists/oss-security/2016/09/17/2
http://www.securityfocus.com/bid/93037
http://www.ubuntu.com/usn/USN-3144-1
http://www.ubuntu.com/usn/USN-3144-2
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
http://www.ubuntu.com/usn/USN-3147-1
https://access.redhat.com/security/cve/CVE-2016-7425
https://bugzilla.redhat.com/show_bug.cgi?id=1377330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
https://github.com/torvalds/linux/commit/7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
https://linux.oracle.com/cve/CVE-2016-7425.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://security-tracker.debian.org/tracker/CVE-2016-7425
https://ubuntu.com/security/notices/USN-3144-1
https://ubuntu.com/security/notices/USN-3144-2
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3147-1
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3162-2
kernel-headers CVE-2016-7916 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8148a73c9901a8794a50f950083c00ccf97d43b3
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.4
http://www.securityfocus.com/bid/94138
http://www.ubuntu.com/usn/USN-3159-1
http://www.ubuntu.com/usn/USN-3159-2
https://access.redhat.com/security/cve/CVE-2016-7916
https://bugzilla.kernel.org/show_bug.cgi?id=116461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916
https://forums.grsecurity.net/viewtopic.php?f=3&t=4363
https://github.com/torvalds/linux/commit/8148a73c9901a8794a50f950083c00ccf97d43b3
https://ubuntu.com/security/notices/USN-3159-1
https://ubuntu.com/security/notices/USN-3159-2
https://ubuntu.com/security/notices/USN-3160-1
https://ubuntu.com/security/notices/USN-3160-2
kernel-headers CVE-2016-8405 LOW 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2017/dsa-3791
http://www.securityfocus.com/bid/94686
https://access.redhat.com/security/cve/CVE-2016-8405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405
https://marc.info/?l=linux-kernel&m=148365805203921&w=2
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
kernel-headers CVE-2016-8658 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ded89912156b1a47d940a0c954c43afbabd0c42c
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/10/13/1
http://www.securityfocus.com/bid/93541
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
https://access.redhat.com/security/cve/CVE-2016-8658
https://bugzilla.redhat.com/show_bug.cgi?id=1384403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658
https://github.com/torvalds/linux/commit/ded89912156b1a47d940a0c954c43afbabd0c42c
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
kernel-headers CVE-2016-9178 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/11/03/2
http://www.openwall.com/lists/oss-security/2016/11/04/4
http://www.securityfocus.com/bid/94144
https://access.redhat.com/security/cve/CVE-2016-9178
https://bugzilla.redhat.com/show_bug.cgi?id=1391908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178
https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af
https://linux.oracle.com/cve/CVE-2016-9178.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
kernel-headers CVE-2016-9756 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12
http://www.openwall.com/lists/oss-security/2016/12/01/1
http://www.securityfocus.com/bid/94615
https://access.redhat.com/security/cve/CVE-2016-9756
https://bugzilla.redhat.com/show_bug.cgi?id=1400468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756
https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c
https://linux.oracle.com/cve/CVE-2016-9756.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://ubuntu.com/security/notices/USN-3167-1
https://ubuntu.com/security/notices/USN-3167-2
https://ubuntu.com/security/notices/USN-3168-1
https://ubuntu.com/security/notices/USN-3168-2
https://ubuntu.com/security/notices/USN-3169-1
https://ubuntu.com/security/notices/USN-3169-2
https://ubuntu.com/security/notices/USN-3170-1
kernel-headers CVE-2017-0627 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/98205
https://access.redhat.com/security/cve/CVE-2017-0627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627
https://github.com/LineageOS/android_kernel_lge_g3/commit/f85c1738998cdbd67e158e1f3b2af8f7c62a269e
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-uvc-driver
https://ubuntu.com/security/notices/USN-3674-1
https://ubuntu.com/security/notices/USN-3674-2
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
kernel-headers CVE-2017-0630 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/98213
https://access.redhat.com/security/cve/CVE-2017-0630
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
kernel-headers CVE-2017-1000365 LOW 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99156
https://access.redhat.com/security/cve/CVE-2017-1000365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
https://linux.oracle.com/cve/CVE-2017-1000365.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://patchwork.kernel.org/patch/9803203/
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
kernel-headers CVE-2017-1000371 LOW 3.10.0-1062.7.1.el7
Expand...http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99131
https://access.redhat.com/security/cve/CVE-2017-1000371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
https://linux.oracle.com/cve/CVE-2017-1000371.html
https://linux.oracle.com/errata/ELSA-2020-1524.html
https://www.exploit-db.com/exploits/42273/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
kernel-headers CVE-2017-10810 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a
http://www.debian.org/security/2017/dsa-3927
http://www.securityfocus.com/bid/99433
https://access.redhat.com/security/cve/CVE-2017-10810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810
https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
https://lkml.org/lkml/2017/4/6/668
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
kernel-headers CVE-2017-11473 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/100010
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-11473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
https://linux.oracle.com/cve/CVE-2017-11473.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-12153 LOW 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2017/q3/437
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100855
https://access.redhat.com/security/cve/CVE-2017-12153
https://bugzilla.novell.com/show_bug.cgi?id=1058410
https://bugzilla.redhat.com/show_bug.cgi?id=1491046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
https://linux.oracle.com/cve/CVE-2017-12153.html
https://linux.oracle.com/errata/ELSA-2019-4531.html
https://marc.info/?l=linux-wireless&m=150525493517953&w=2
https://marc.info/?t=150525503100001&r=1&w=2
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-12762 LOW 3.10.0-1062.7.1.el7
Expand...http://seclists.org/oss-sec/2017/q3/274
http://www.openwall.com/lists/oss-security/2020/02/11/1
http://www.openwall.com/lists/oss-security/2020/02/11/2
http://www.openwall.com/lists/oss-security/2020/02/14/4
http://www.securityfocus.com/bid/100251
https://access.redhat.com/security/cve/CVE-2017-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762
https://patchwork.kernel.org/patch/9880041/
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
kernel-headers CVE-2017-14140 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9
http://www.securityfocus.com/bid/100876
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/security/cve/CVE-2017-14140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9
https://linux.oracle.com/cve/CVE-2017-14140.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-15115 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/oss-sec/2017/q4/282
http://www.securityfocus.com/bid/101877
https://access.redhat.com/security/cve/CVE-2017-15115
https://bugzilla.redhat.com/show_bug.cgi?id=1513345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115
https://git.kernel.org/linus/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://linux.oracle.com/cve/CVE-2017-15115.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.ozlabs.org/patch/827077/
https://source.android.com/security/bulletin/pixel/2018-04-01
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3581-3
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3581-3/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-16525 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102028
https://access.redhat.com/security/cve/CVE-2017-16525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525
https://github.com/torvalds/linux/commit/299d7572e46f98534033a9e65973f13ad1ce9047
https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787
https://groups.google.com/d/msg/syzkaller/cMACrmo1x0k/4KhRoUgABAAJ
https://linux.oracle.com/cve/CVE-2017-16525.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
kernel-headers CVE-2017-16526 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
https://linux.oracle.com/cve/CVE-2017-16526.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2018/dsa-4187
kernel-headers CVE-2017-16527 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527
https://github.com/torvalds/linux/commit/124751d5e63c823092060074bd0abaae61aaa9c4
https://groups.google.com/d/msg/syzkaller/jf7GTr_g2CU/iVlLhMciCQAJ
https://linux.oracle.com/cve/CVE-2017-16527.html
https://linux.oracle.com/errata/ELSA-2017-3651.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16529 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/103284
https://access.redhat.com/security/cve/CVE-2017-16529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529
https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ
https://linux.oracle.com/cve/CVE-2017-16529.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16530 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16530
https://github.com/torvalds/linux/commit/786de92b3cb26012d3d0f00ee37adf14527f35c4
https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ
https://linux.oracle.com/cve/CVE-2017-16530.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
kernel-headers CVE-2017-16531 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102025
https://access.redhat.com/security/cve/CVE-2017-16531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531
https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb
https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ
https://linux.oracle.com/cve/CVE-2017-16531.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
kernel-headers CVE-2017-16532 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532
https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
https://linux.oracle.com/cve/CVE-2017-16532.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16533 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102026
https://access.redhat.com/security/cve/CVE-2017-16533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533
https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b
https://groups.google.com/d/msg/syzkaller/CxkJ9QZgwlM/O3IOvAaGAwAJ
https://linux.oracle.com/cve/CVE-2017-16533.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16534 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534
https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb
https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
kernel-headers CVE-2017-16535 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102022
https://access.redhat.com/security/cve/CVE-2017-16535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535
https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e
https://groups.google.com/d/msg/syzkaller/tzdz2fTB1K0/OvjIgLSTAgAJ
https://linux.oracle.com/cve/CVE-2017-16535.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16536 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536
https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
https://linux.oracle.com/cve/CVE-2017-16536.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9963527/
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16537 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537
https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ
https://linux.oracle.com/cve/CVE-2017-16537.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.kernel.org/patch/9994017/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16538 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
https://git.linuxtv.org/media_tree.git/commit/?id=3d932ee27e852e4904647f15b64dedca51187ad7
https://git.linuxtv.org/media_tree.git/commit/?id=7bf7a7116ed313c601307f7e585419369926ab05
https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ
https://linux.oracle.com/cve/CVE-2017-16538.html
https://linux.oracle.com/errata/ELSA-2020-5750.html
https://patchwork.linuxtv.org/patch/44566/
https://patchwork.linuxtv.org/patch/44567/
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
kernel-headers CVE-2017-16643 LOW 3.10.0-1062.7.1.el7
Expand...http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
http://www.securityfocus.com/bid/101769
https://access.redhat.com/security/cve/CVE-2017-16643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643
https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
https://linux.oracle.com/cve/CVE-2017-16643.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3509-1
https://ubuntu.com/security/notices/USN-3509-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-16644 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/101842
https://access.redhat.com/security/cve/CVE-2017-16644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
https://git.linuxtv.org/media_tree.git/commit/?id=c0f71bbb810237a38734607ca4599632f7f5d47f
https://groups.google.com/d/msg/syzkaller/ngC5SLvxPm4/gduhCARhAwAJ
https://linux.oracle.com/cve/CVE-2017-16644.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://patchwork.kernel.org/patch/9966135/
https://ubuntu.com/security/notices/USN-3754-1
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/3754-1/
https://www.debian.org/security/2017/dsa-4073
kernel-headers CVE-2017-16646 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/101846
https://access.redhat.com/security/cve/CVE-2017-16646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646
https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
https://linux.oracle.com/cve/CVE-2017-16646.html
https://linux.oracle.com/errata/ELSA-2018-4071.html
https://patchwork.linuxtv.org/patch/45291/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
kernel-headers CVE-2017-16647 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/101767
https://access.redhat.com/security/cve/CVE-2017-16647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647
https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ
https://patchwork.ozlabs.org/patch/834686/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
kernel-headers CVE-2017-16649 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/101761
https://access.redhat.com/security/cve/CVE-2017-16649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2cb80187ba065d7decad7c6614e35e07aec8a974
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://patchwork.ozlabs.org/patch/834771/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3822-1
https://ubuntu.com/security/notices/USN-3822-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
kernel-headers CVE-2017-16650 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/101791
https://access.redhat.com/security/cve/CVE-2017-16650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7fd078337201cf7468f53c3d9ef81ff78cb6df3b
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://linux.oracle.com/cve/CVE-2017-16650.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://patchwork.ozlabs.org/patch/834770/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-17450 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.securityfocus.com/bid/102110
https://access.redhat.com/security/cve/CVE-2017-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=916a27901de01446bcf57ecca4783f6cff493309
https://linux.oracle.com/cve/CVE-2017-17450.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lkml.org/lkml/2017/12/5/982
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
kernel-headers CVE-2017-17741 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/102227
https://access.redhat.com/security/cve/CVE-2017-17741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
https://linux.oracle.com/cve/CVE-2017-17741.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.spinics.net/lists/kvm/msg160710.html
https://www.spinics.net/lists/kvm/msg160796.html
kernel-headers CVE-2017-5549 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410
http://seclists.org/oss-sec/2017/q1/161
http://www.debian.org/security/2017/dsa-3791
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
http://www.openwall.com/lists/oss-security/2017/01/21/3
http://www.securityfocus.com/bid/95715
https://access.redhat.com/security/cve/CVE-2017-5549
https://bugzilla.redhat.com/show_bug.cgi?id=1416114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549
https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410
https://ubuntu.com/security/notices/USN-3208-1
https://ubuntu.com/security/notices/USN-3208-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-5897 LOW 3.10.0-1062.7.1.el7
Expand...http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2017/02/07/2
http://www.securityfocus.com/bid/96037
http://www.securitytracker.com/id/1037794
https://access.redhat.com/security/cve/CVE-2017-5897
https://bugzilla.redhat.com/show_bug.cgi?id=1419848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://linux.oracle.com/cve/CVE-2017-5897.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://source.android.com/security/bulletin/2017-09-01
https://ubuntu.com/security/notices/USN-3265-1
https://ubuntu.com/security/notices/USN-3265-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-5967 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
http://www.securityfocus.com/bid/96271
https://access.redhat.com/security/cve/CVE-2017-5967
https://bugzilla.kernel.org/show_bug.cgi?id=193921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967
https://ubuntu.com/security/notices/USN-4904-1
kernel-headers CVE-2017-7261 LOW 3.10.0-1062.7.1.el7
Expand...http://marc.info/?t=149037004200005&r=1&w=2
http://www.securityfocus.com/bid/97096
https://access.redhat.com/security/cve/CVE-2017-7261
https://bugzilla.redhat.com/show_bug.cgi?id=1435719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261
https://linux.oracle.com/cve/CVE-2017-7261.html
https://linux.oracle.com/errata/ELSA-2020-5671.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html
https://ubuntu.com/security/notices/USN-3291-1
https://ubuntu.com/security/notices/USN-3291-2
https://ubuntu.com/security/notices/USN-3291-3
https://ubuntu.com/security/notices/USN-3293-1
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
kernel-headers CVE-2017-7273 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
http://www.securityfocus.com/bid/97190
https://access.redhat.com/security/cve/CVE-2017-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273
https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
https://linux.oracle.com/cve/CVE-2017-7273.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
kernel-headers CVE-2017-7346 LOW 3.10.0-1062.7.1.el7
Expand...http://marc.info/?l=linux-kernel&m=149086968410117&w=2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/03/29/1
http://www.securityfocus.com/bid/97257
https://access.redhat.com/security/cve/CVE-2017-7346
https://bugzilla.redhat.com/show_bug.cgi?id=1437431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346
https://github.com/torvalds/linux/commit/ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf
https://linux.oracle.com/cve/CVE-2017-7346.html
https://linux.oracle.com/errata/ELSA-2020-5670.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/137429.html
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
kernel-headers CVE-2017-8831 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/archive/1/540770/30/0/threaded
http://www.securityfocus.com/bid/99619
https://access.redhat.com/security/cve/CVE-2017-8831
https://bugzilla.kernel.org/show_bug.cgi?id=195559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831
https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c
https://linux.oracle.com/cve/CVE-2017-8831.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
kernel-headers CVE-2017-8924 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=654b404f2a222f918af9b0cd18ad469d0c941a8e
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98451
https://access.redhat.com/security/cve/CVE-2017-8924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924
https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e
https://linux.oracle.com/cve/CVE-2017-8924.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
kernel-headers CVE-2017-8925 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30572418b445d85fcfe6c8fe84c947d2606767d8
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98462
https://access.redhat.com/security/cve/CVE-2017-8925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925
https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8
https://linux.oracle.com/cve/CVE-2017-8925.html
https://linux.oracle.com/errata/ELSA-2020-5936.html
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
kernel-headers CVE-2017-9605 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/06/13/2
http://www.securityfocus.com/bid/99095
https://access.redhat.com/security/cve/CVE-2017-9605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605
https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
https://linux.oracle.com/cve/CVE-2017-9605.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
kernel-headers CVE-2018-1108 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/104055
https://access.redhat.com/security/cve/CVE-2018-1108
https://bugs.chromium.org/p/project-zero/issues/detail?id=1559
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3718-1/
https://usn.ubuntu.com/3718-2/
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://www.debian.org/security/2018/dsa-4188
kernel-headers CVE-2018-14609 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14609
https://bugzilla.kernel.org/show_bug.cgi?id=199833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
https://linux.oracle.com/cve/CVE-2018-14609.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://patchwork.kernel.org/patch/10500521/
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2018/dsa-4308
kernel-headers CVE-2018-14612 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14612
https://bugzilla.kernel.org/show_bug.cgi?id=199847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612
https://linux.oracle.com/cve/CVE-2018-14612.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://patchwork.kernel.org/patch/10503403/
https://patchwork.kernel.org/patch/10503413/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
kernel-headers CVE-2018-14613 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14613
https://bugzilla.kernel.org/show_bug.cgi?id=199849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613
https://linux.oracle.com/cve/CVE-2018-14613.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://patchwork.kernel.org/patch/10503147/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2018-18710 LOW 3.10.0-1062.7.1.el7
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
http://www.securityfocus.com/bid/106041
https://access.redhat.com/security/cve/CVE-2018-18710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710
https://git.kernel.org/linus/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://linux.oracle.com/cve/CVE-2018-18710.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://ubuntu.com/security/notices/USN-3846-1
https://ubuntu.com/security/notices/USN-3847-1
https://ubuntu.com/security/notices/USN-3847-2
https://ubuntu.com/security/notices/USN-3847-3
https://ubuntu.com/security/notices/USN-3848-1
https://ubuntu.com/security/notices/USN-3848-2
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3846-1/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3848-1/
https://usn.ubuntu.com/3848-2/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
kernel-headers CVE-2018-19985 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2018-19985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
https://git.kernel.org/linus/5146f95df782b0ac61abde36567e718692725c89
https://hexhive.epfl.ch/projects/perifuzz/
https://linux.oracle.com/cve/CVE-2018-19985.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
https://seclists.org/bugtraq/2019/Jan/52
https://security.netapp.com/advisory/ntap-20190404-0002/
https://ubuntu.com/security/notices/USN-3910-1
https://ubuntu.com/security/notices/USN-3910-2
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
kernel-headers CVE-2018-7273 LOW 3.10.0-1062.7.1.el7
Expand...http://www.securityfocus.com/bid/103088
https://access.redhat.com/security/cve/CVE-2018-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273
https://lkml.org/lkml/2018/2/20/669
https://www.exploit-db.com/exploits/44325/
kernel-headers CVE-2019-0136 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.18.2.el7
Expand...http://jvn.jp/en/jp/JVN75617741/index.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.securityfocus.com/bid/108777
https://access.redhat.com/security/cve/CVE-2019-0136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0136
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://support.lenovo.com/us/en/product_security/LEN-27828
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://usn.ubuntu.com/4147-1/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html
kernel-headers CVE-2019-10638 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/109092
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-10638
https://arxiv.org/pdf/1906.10478.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df453700e8d81b1bdafdf684365ee2b9431fb702
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux/commit/55f0fc7a02de8f12757f4937143d8d5091b2e40b
https://github.com/torvalds/linux/commit/df453700e8d81b1bdafdf684365ee2b9431fb702
https://linux.oracle.com/cve/CVE-2019-10638.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-10639 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
https://access.redhat.com/security/cve/CVE-2019-10639
https://arxiv.org/pdf/1906.10478.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
https://linux.oracle.com/cve/CVE-2019-10639.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://seclists.org/bugtraq/2019/Aug/18
https://security.netapp.com/advisory/ntap-20190806-0001/
https://support.f5.com/csp/article/K32804955
https://support.f5.com/csp/article/K32804955?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://www.debian.org/security/2019/dsa-4497
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-11190 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/15/1
http://www.securityfocus.com/bid/107890
https://access.redhat.com/security/cve/CVE-2019-11190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190
https://git.kernel.org/linus/9f834ec18defc369d73ccf9e87a2790bfa05bf46 (4.8-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff
https://linux.oracle.com/cve/CVE-2019-11190.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-2/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
kernel-headers CVE-2019-12380 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://access.redhat.com/security/cve/CVE-2019-12380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
kernel-headers CVE-2019-12614 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/108550
https://access.redhat.com/security/cve/CVE-2019-12614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607
https://linux.oracle.com/cve/CVE-2019-12614.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/6/3/526
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K54337315
https://support.f5.com/csp/article/K54337315?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4093-1
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4095-1
https://ubuntu.com/security/notices/USN-4095-2
https://usn.ubuntu.com/4093-1/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4095-1/
https://usn.ubuntu.com/4095-2/
kernel-headers CVE-2019-15090 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15090
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc
https://github.com/torvalds/linux/commit/c09581a52765a85f19fc35340127396d5e3379cc
https://linux.oracle.com/cve/CVE-2019-15090.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
kernel-headers CVE-2019-15099 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=bfd6e6e6c5d2ee43a3d9902b36e01fc7527ebb27
https://linux.oracle.com/cve/CVE-2019-15099.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike@gmail.com/T/#u
https://lore.kernel.org/linux-wireless/20191018133516.12606-1-linux@roeck-us.net/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K76295179
https://support.f5.com/csp/article/K76295179?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-15217 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15217
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
https://linux.oracle.com/cve/CVE-2019-15217.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64
https://ubuntu.com/security/notices/USN-4147-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4147-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4302-1/
kernel-headers CVE-2019-15218 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15218
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e
https://linux.oracle.com/cve/CVE-2019-15218.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-15219 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15219
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a
https://linux.oracle.com/cve/CVE-2019-15219.html
https://linux.oracle.com/errata/ELSA-2019-4878.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b
kernel-headers CVE-2019-15221 LOW 3.10.0-1062.7.1.el7 3.10.0-1127.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15221
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
https://linux.oracle.com/cve/CVE-2019-15221.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
kernel-headers CVE-2019-15291 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/1
https://access.redhat.com/security/cve/CVE-2019-15291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291
https://linux.oracle.com/cve/CVE-2019-15291.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.openwall.com/lists/oss-security/2019/08/20/2
kernel-headers CVE-2019-15807 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-15807
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807
https://git.kernel.org/linus/3b0541791453fbe7f42867e310e0c9eb6295364d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
https://linux.oracle.com/cve/CVE-2019-15807.html
https://linux.oracle.com/errata/ELSA-2020-5512.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K52136304?utm_source=f5support&utm_medium=RSS
kernel-headers CVE-2019-15921 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15921
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921
https://git.kernel.org/linus/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://security.netapp.com/advisory/ntap-20191004-0001/
kernel-headers CVE-2019-15924 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15924
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924
https://git.kernel.org/linus/01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://security.netapp.com/advisory/ntap-20191004-0001/
kernel-headers CVE-2019-16229 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-16229
https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-16230 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
kernel-headers CVE-2019-16231 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://access.redhat.com/security/cve/CVE-2019-16231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
kernel-headers CVE-2019-16233 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-16233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
kernel-headers CVE-2019-16234 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/security/cve/CVE-2019-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
kernel-headers CVE-2019-16994 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-16994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://git.kernel.org/linus/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://linux.oracle.com/cve/CVE-2019-16994.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://security.netapp.com/advisory/ntap-20191031-0005/
kernel-headers CVE-2019-18806 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-18806
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18806
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://git.kernel.org/linus/1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://linux.oracle.com/cve/CVE-2019-18806.html
https://linux.oracle.com/errata/ELSA-2020-5649.html
kernel-headers CVE-2019-18885 LOW 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/security/cve/CVE-2019-18885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ba3bc9dd150457c506e4661380a6183af651c1
https://github.com/bobfuzzer/CVE-2019-18885
https://github.com/torvalds/linux/commit/09ba3bc9dd150457c506e4661380a6183af651c1
https://linux.oracle.com/cve/CVE-2019-18885.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-19039 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4414-1/
kernel-headers CVE-2019-19054 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
https://linux.oracle.com/cve/CVE-2019-19054.html
https://linux.oracle.com/errata/ELSA-2020-5878.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
kernel-headers CVE-2019-19056 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
https://linux.oracle.com/cve/CVE-2019-19056.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
kernel-headers CVE-2019-19057 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
https://linux.oracle.com/cve/CVE-2019-19057.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-19058 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058
https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
https://linux.oracle.com/cve/CVE-2019-19058.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
kernel-headers CVE-2019-19059 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059
https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
https://linux.oracle.com/cve/CVE-2019-19059.html
https://linux.oracle.com/errata/ELSA-2020-4060.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
kernel-headers CVE-2019-19062 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
https://linux.oracle.com/cve/CVE-2019-19062.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-19063 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb
https://linux.oracle.com/cve/CVE-2019-19063.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-19065 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19065
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065
https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4226-1/
kernel-headers CVE-2019-19066 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
https://linux.oracle.com/cve/CVE-2019-19066.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-19073 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
https://linux.oracle.com/cve/CVE-2019-19073.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-19074 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://github.com/torvalds/linux/commit/728c1e2a05e4b5fc52fab3421dce772a806612a2
https://linux.oracle.com/cve/CVE-2019-19074.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
kernel-headers CVE-2019-19080 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19080
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080
https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4
https://security.netapp.com/advisory/ntap-20191205-0001/
kernel-headers CVE-2019-19081 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19081
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081
https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e
https://security.netapp.com/advisory/ntap-20191205-0001/
kernel-headers CVE-2019-19082 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-19083 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19083
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
kernel-headers CVE-2019-19378 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
kernel-headers CVE-2019-19533 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19533
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
https://git.kernel.org/linus/a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://linux.oracle.com/cve/CVE-2019-19533.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
kernel-headers CVE-2019-19965 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
https://git.kernel.org/linus/f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://linux.oracle.com/cve/CVE-2019-19965.html
https://linux.oracle.com/errata/ELSA-2020-5879.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2019-20054 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-20054
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054
https://git.kernel.org/linus/23da9588037ecdd4901db76a5b79a42b529c4ec3
https://git.kernel.org/linus/89189557b47b35683a27c80ee78aef18248eefb4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23da9588037ecdd4901db76a5b79a42b529c4ec3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4
https://linux.oracle.com/cve/CVE-2019-20054.html
https://linux.oracle.com/errata/ELSA-2020-5879.html
https://security.netapp.com/advisory/ntap-20200204-0002/
kernel-headers CVE-2019-20095 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-20095
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095
https://git.kernel.org/linus/003b686ace820ce2d635a83f10f2d7f9c147dabc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc
https://linux.oracle.com/cve/CVE-2019-20095.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://security.netapp.com/advisory/ntap-20200204-0002/
kernel-headers CVE-2019-20096 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://access.redhat.com/security/cve/CVE-2019-20096
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096
https://git.kernel.org/linus/1d3ff0950e2b40dc861b1739029649d03f591820
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820
https://linux.oracle.com/cve/CVE-2019-20096.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
kernel-headers CVE-2020-10690 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-10690
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690
https://linux.oracle.com/cve/CVE-2020-10690.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lore.kernel.org/linux-fsdevel/20191125125342.6189-1-vdronov@redhat.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-10690
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4419-1
https://usn.ubuntu.com/4419-1/
kernel-headers CVE-2020-10773 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-10773
https://bugzilla.redhat.com/show_bug.cgi?id=1846380
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f
https://linux.oracle.com/cve/CVE-2020-10773.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
kernel-headers CVE-2020-10781 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-10781
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
https://linux.oracle.com/cve/CVE-2020-10781.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/linux-block/20200617103412.GA2027053@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-10781
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://www.openwall.com/lists/oss-security/2020/06/18/1
kernel-headers CVE-2020-10942 LOW 3.10.0-1062.7.1.el7 3.10.0-1160.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
http://www.openwall.com/lists/oss-security/2020/04/15/4
https://access.redhat.com/security/cve/CVE-2020-10942
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
https://linux.oracle.com/cve/CVE-2020-10942.html
https://linux.oracle.com/errata/ELSA-2020-5663.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lkml.org/lkml/2020/2/15/125
https://nvd.nist.gov/vuln/detail/CVE-2020-10942
https://security.netapp.com/advisory/ntap-20200403-0003/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://www.debian.org/security/2020/dsa-4667
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-11608 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11608
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30
https://git.kernel.org/linus/998912346c0da53a6dbb71fab3a138586b596b30
https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30
https://linux.oracle.com/cve/CVE-2020-11608.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11608
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-11609 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11609
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205
https://git.kernel.org/linus/485b06aadb933190f4bc44e006076bc27a23f205
https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205
https://linux.oracle.com/cve/CVE-2020-11609.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11609
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-12652 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12652
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://git.kernel.org/linus/28d76df18f0ad5bcf5fa48510b225f0ed262a99b (5.5-rc7)
https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://linux.oracle.com/cve/CVE-2020-12652.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.debian.org/security/2020/dsa-4698
kernel-headers CVE-2020-12655 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62
https://git.kernel.org/linus/d0c7feaf87678371c2c09b3709400be416b2dc62 (5.7-rc1)
https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
https://linux.oracle.com/cve/CVE-2020-12655.html
https://linux.oracle.com/errata/ELSA-2020-5756.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/
https://lore.kernel.org/linux-xfs/20200221153803.GP9506@magnolia/
https://nvd.nist.gov/vuln/detail/CVE-2020-12655
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4465-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://ubuntu.com/security/notices/USN-5343-1
https://usn.ubuntu.com/4465-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
kernel-headers CVE-2020-12656 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-12656
https://bugzilla.kernel.org/show_bug.cgi?id=206651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656
https://nvd.nist.gov/vuln/detail/CVE-2020-12656
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
kernel-headers CVE-2020-14304 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
kernel-headers CVE-2020-14390 LOW 3.10.0-1062.7.1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-14390
https://bugzilla.redhat.com/show_bug.cgi?id=1876788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50145474f6ef4a9c19205b173da6264a644c7489
https://linux.oracle.com/cve/CVE-2020-14390.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14390
https://seclists.org/oss-sec/2020/q3/174
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.openwall.com/lists/oss-security/2020/09/15/2
kernel-headers CVE-2020-26146 LOW 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26146
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26146.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-26147 LOW 3.10.0-1062.7.1.el7
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26147
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26147.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
kernel-headers CVE-2020-27820 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27820
https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2020-27820.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
kernel-headers CVE-2020-29660 LOW 3.10.0-1062.7.1.el7
Expand...http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29660
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://linux.oracle.com/cve/CVE-2020-29660.html
https://linux.oracle.com/errata/ELSA-2021-9039.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29660
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.debian.org/security/2021/dsa-4843
kernel-headers CVE-2020-35501 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
kernel-headers CVE-2021-31916 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-31916
https://bugzilla.redhat.com/show_bug.cgi?id=1946965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://linux.oracle.com/cve/CVE-2021-31916.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31916
https://seclists.org/oss-sec/2021/q1/268
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.openwall.com/lists/oss-security/2021/03/28/1
kernel-headers CVE-2021-33135 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-33135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33135
https://git.kernel.org/linus/08999b2489b4c9b939d7483dbd03702ee4576d96 (5.17-rc8)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00603.html
kernel-headers CVE-2021-3635 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3635
https://bugzilla.redhat.com/show_bug.cgi?id=1976946
https://linux.oracle.com/cve/CVE-2021-3635.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
kernel-headers CVE-2021-3659 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659
https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://linux.oracle.com/cve/CVE-2021-3659.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
kernel-headers CVE-2021-38198 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-38198
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198
https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7
https://linux.oracle.com/cve/CVE-2021-38198.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38198
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5343-1
kernel-headers CVE-2022-24448 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-24448
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://linux.oracle.com/cve/CVE-2022-24448.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
kernel-headers CVE-2022-32296 LOW 3.10.0-1062.7.1.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-32296
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5
https://nvd.nist.gov/vuln/detail/CVE-2022-32296
krb5-devel CVE-2014-5351 MEDIUM 1.15.1-46.el7
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
krb5-devel CVE-2015-2695 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-devel CVE-2015-2696 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-devel CVE-2015-2697 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-devel CVE-2017-15088 MEDIUM 1.15.1-46.el7
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
krb5-devel CVE-2020-17049 MEDIUM 1.15.1-46.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
krb5-devel CVE-2020-28196 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
krb5-devel CVE-2021-36222 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
krb5-devel CVE-2021-37750 MEDIUM 1.15.1-46.el7 1.15.1-51.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
krb5-devel CVE-2017-11462 LOW 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
krb5-libs CVE-2014-5351 MEDIUM 1.15.1-46.el7
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
krb5-libs CVE-2015-2695 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-libs CVE-2015-2696 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-libs CVE-2015-2697 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
krb5-libs CVE-2017-15088 MEDIUM 1.15.1-46.el7
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
krb5-libs CVE-2020-17049 MEDIUM 1.15.1-46.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
krb5-libs CVE-2020-28196 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
krb5-libs CVE-2021-36222 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
krb5-libs CVE-2021-37750 MEDIUM 1.15.1-46.el7 1.15.1-51.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
krb5-libs CVE-2017-11462 LOW 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
less CVE-2014-9488 LOW 458-9.el7
Expand...http://advisories.mageia.org/MGASA-2015-0139.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:199
http://www.openwall.com/lists/oss-security/2015/03/10/14
https://access.redhat.com/security/cve/CVE-2014-9488
https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488
libX11 CVE-2021-31535 HIGH 1.6.7-3.el7_9 1.6.7-4.el7_9
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libX11 CVE-2016-7943 MEDIUM 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libX11 CVE-2020-14344 MEDIUM 1.6.7-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
libX11 CVE-2016-7942 LOW 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libX11-common CVE-2021-31535 HIGH 1.6.7-3.el7_9 1.6.7-4.el7_9
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libX11-common CVE-2016-7943 MEDIUM 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libX11-common CVE-2020-14344 MEDIUM 1.6.7-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
libX11-common CVE-2016-7942 LOW 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libX11-devel CVE-2021-31535 HIGH 1.6.7-3.el7_9 1.6.7-4.el7_9
Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html
http://seclists.org/fulldisclosure/2021/May/52
http://www.openwall.com/lists/oss-security/2021/05/18/2
https://access.redhat.com/security/cve/CVE-2021-31535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
https://linux.oracle.com/cve/CVE-2021-31535.html
https://linux.oracle.com/errata/ELSA-2021-4326.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/
https://lists.freedesktop.org/archives/xorg/
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://security.gentoo.org/glsa/202105-16
https://security.netapp.com/advisory/ntap-20210813-0001/
https://ubuntu.com/security/notices/USN-4966-1
https://ubuntu.com/security/notices/USN-4966-2
https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/
https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt
https://www.debian.org/security/2021/dsa-4920
https://www.openwall.com/lists/oss-security/2021/05/18/2
https://www.openwall.com/lists/oss-security/2021/05/18/3
libX11-devel CVE-2016-7943 MEDIUM 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libX11-devel CVE-2020-14344 MEDIUM 1.6.7-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.openwall.com/lists/oss-security/2020/07/31/1
libX11-devel CVE-2016-7942 LOW 1.6.7-3.el7_9
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
libXfixes CVE-2016-7944 MEDIUM 5.0.3-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93361
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7944
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5437-1
libXfixes-devel CVE-2016-7944 MEDIUM 5.0.3-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93361
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7944
https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5437-1
libXi CVE-2016-7945 MEDIUM 1.7.9-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93364
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7945
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
libXi CVE-2016-7946 LOW 1.7.9-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93374
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7946
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
libXrender CVE-2016-7949 MEDIUM 0.9.10-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93366
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7949
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=9362c7ddd1af3b168953d0737877bc52d79c94f4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
libXrender CVE-2016-7950 MEDIUM 0.9.10-1.el7
Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93369
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7950
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=8fad00b0b647ee662ce4737ca15be033b7a21714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
libblkid CVE-2014-9114 MEDIUM 2.23.2-61.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
libblkid CVE-2016-2779 MEDIUM 2.23.2-61.el7
Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
libblkid CVE-2022-0563 MEDIUM 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libblkid CVE-2015-5218 LOW 2.23.2-61.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
libblkid CVE-2021-37600 LOW 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libcom_err CVE-2015-0247 MEDIUM 1.42.9-17.el7
Expand...http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
libcom_err CVE-2019-5094 MEDIUM 1.42.9-17.el7 1.42.9-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
libcom_err CVE-2019-5188 MEDIUM 1.42.9-17.el7 1.42.9-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://security.netapp.com/advisory/ntap-20220506-0001/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
libcom_err CVE-2022-1304 MEDIUM 1.42.9-17.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
libcom_err CVE-2015-1572 LOW 1.42.9-17.el7
Expand...http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
libcom_err-devel CVE-2015-0247 MEDIUM 1.42.9-17.el7
Expand...http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
libcom_err-devel CVE-2019-5094 MEDIUM 1.42.9-17.el7 1.42.9-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094
https://linux.oracle.com/cve/CVE-2019-5094.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5094
https://seclists.org/bugtraq/2019/Sep/58
https://security.gentoo.org/glsa/202003-05
https://security.netapp.com/advisory/ntap-20200115-0002/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
https://ubuntu.com/security/notices/USN-4142-1
https://ubuntu.com/security/notices/USN-4142-2
https://usn.ubuntu.com/4142-1/
https://usn.ubuntu.com/4142-2/
https://www.debian.org/security/2019/dsa-4535
libcom_err-devel CVE-2019-5188 MEDIUM 1.42.9-17.el7 1.42.9-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188
https://linux.oracle.com/cve/CVE-2019-5188.html
https://linux.oracle.com/errata/ELSA-2020-4011.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
https://nvd.nist.gov/vuln/detail/CVE-2019-5188
https://security.netapp.com/advisory/ntap-20220506-0001/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
https://ubuntu.com/security/notices/USN-4249-1
https://usn.ubuntu.com/4249-1/
libcom_err-devel CVE-2022-1304 MEDIUM 1.42.9-17.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
libcom_err-devel CVE-2015-1572 LOW 1.42.9-17.el7
Expand...http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
libcurl CVE-2015-3153 MEDIUM 7.29.0-54.el7
Expand...http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
libcurl CVE-2016-8615 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8617 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8618 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8619 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8624 MEDIUM 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8625 MEDIUM 7.29.0-54.el7
Expand...http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2017-1000254 MEDIUM 7.29.0-54.el7
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl CVE-2017-8817 MEDIUM 7.29.0-54.el7
Expand...http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.debian.org/security/2017/dsa-4051
libcurl CVE-2019-5482 MEDIUM 7.29.0-54.el7 7.29.0-59.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
https://access.redhat.com/security/cve/CVE-2019-5482
https://curl.haxx.se/docs/CVE-2019-5482.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
https://linux.oracle.com/cve/CVE-2019-5482.html
https://linux.oracle.com/errata/ELSA-2020-5562.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20191004-0003/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://ubuntu.com/security/notices/USN-4129-1
https://ubuntu.com/security/notices/USN-4129-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
libcurl CVE-2020-8177 MEDIUM 7.29.0-54.el7 7.29.0-59.el7_9.1
Expand...https://access.redhat.com/security/cve/CVE-2020-8177
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8177.html
https://curl.se/docs/CVE-2020-8177.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
https://hackerone.com/reports/887462
https://linux.oracle.com/cve/CVE-2020-8177.html
https://linux.oracle.com/errata/ELSA-2020-5002.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8177
https://ubuntu.com/security/notices/USN-4402-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl CVE-2020-8284 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl CVE-2020-8285 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl CVE-2021-22876 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
libcurl CVE-2021-22924 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl CVE-2021-22946 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl CVE-2021-22947 MEDIUM 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl CVE-2022-27774 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27778 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27778
https://hackerone.com/reports/1553598
https://nvd.nist.gov/vuln/detail/CVE-2022-27778
https://security.netapp.com/advisory/ntap-20220609-0009/
libcurl CVE-2022-27779 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27779
https://hackerone.com/reports/1553301
https://nvd.nist.gov/vuln/detail/CVE-2022-27779
https://security.netapp.com/advisory/ntap-20220609-0009/
libcurl CVE-2022-27780 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://hackerone.com/reports/1553841
https://nvd.nist.gov/vuln/detail/CVE-2022-27780
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
libcurl CVE-2022-27782 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
libcurl CVE-2022-30115 MEDIUM 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-30115
https://hackerone.com/reports/1557449
https://nvd.nist.gov/vuln/detail/CVE-2022-30115
https://security.netapp.com/advisory/ntap-20220609-0009/
libcurl CVE-2016-0755 LOW 7.29.0-54.el7
Expand...http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
libcurl CVE-2016-8616 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8621 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8622 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-8623 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.tenable.com/security/tns-2016-21
libcurl CVE-2016-9586 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl CVE-2017-1000100 LOW 7.29.0-54.el7
Expand...http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl CVE-2017-7407 LOW 7.29.0-54.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
libcurl CVE-2018-20483 LOW 7.29.0-54.el7
Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
libcurl CVE-2019-5436 LOW 7.29.0-54.el7 7.29.0-57.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/11/6
https://access.redhat.com/security/cve/CVE-2019-5436
https://curl.haxx.se/docs/CVE-2019-5436.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
https://linux.oracle.com/cve/CVE-2019-5436.html
https://linux.oracle.com/errata/ELSA-2020-1792.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/
https://seclists.org/bugtraq/2020/Feb/36
https://security.gentoo.org/glsa/202003-29
https://security.netapp.com/advisory/ntap-20190606-0004/
https://support.f5.com/csp/article/K55133295
https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3993-1
https://ubuntu.com/security/notices/USN-3993-2
https://www.debian.org/security/2020/dsa-4633
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libcurl CVE-2020-8231 LOW 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
libcurl CVE-2021-22898 LOW 7.29.0-54.el7
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl CVE-2021-22925 LOW 7.29.0-54.el7
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl CVE-2022-27781 LOW 7.29.0-54.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
libdb CVE-2017-10140 MEDIUM 5.3.21-25.el7
Expand...http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.oracle.com/security-alerts/cpujul2020.html
libdb CVE-2019-2708 LOW 5.3.21-25.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
libdb-utils CVE-2017-10140 MEDIUM 5.3.21-25.el7
Expand...http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.oracle.com/security-alerts/cpujul2020.html
libdb-utils CVE-2019-2708 LOW 5.3.21-25.el7
Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
libgcc CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libgcc CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libgcc CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libgcc CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libgcc CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libgcc CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libgcc CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libgcc CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libgcc CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libgcc CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libgcc CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libgcc CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libgcc CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libgcc CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libgcc CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgcc CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libgcc CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libgcc CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libgcrypt CVE-2014-5270 MEDIUM 1.5.3-14.el7
Expand...http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html
http://openwall.com/lists/oss-security/2014/08/16/2
http://www.cs.tau.ac.il/~tromer/handsoff/
http://www.debian.org/security/2014/dsa-3024
http://www.debian.org/security/2014/dsa-3073
https://access.redhat.com/security/cve/CVE-2014-5270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270
https://ubuntu.com/security/notices/USN-2339-1
https://ubuntu.com/security/notices/USN-2339-2
libgcrypt CVE-2017-7526 MEDIUM 1.5.3-14.el7
Expand...http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
libgcrypt CVE-2019-12904 MEDIUM 1.5.3-14.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-12904
https://dev.gnupg.org/T4541
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html
libgcrypt CVE-2021-33560 MEDIUM 1.5.3-14.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgcrypt CVE-2021-40528 MEDIUM 1.5.3-14.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
libgcrypt CVE-2014-3591 LOW 1.5.3-14.el7
Expand...http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
libgcrypt CVE-2015-0837 LOW 1.5.3-14.el7
Expand...http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
libgfortran CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libgfortran CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libgfortran CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libgfortran CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libgfortran CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libgfortran CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libgfortran CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libgfortran CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libgfortran CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libgfortran CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libgfortran CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libgfortran CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libgfortran CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libgfortran CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libgfortran CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgfortran CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libgfortran CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libgfortran CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libgomp CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libgomp CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libgomp CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libgomp CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libgomp CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libgomp CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libgomp CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libgomp CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libgomp CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libgomp CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libgomp CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libgomp CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libgomp CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libgomp CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libgomp CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libgomp CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libgomp CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libgomp CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libidn CVE-2015-2059 LOW 1.28-4.el7
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3578
http://www.openwall.com/lists/oss-security/2015/02/23/25
http://www.securityfocus.com/bid/72736
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-2059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059
https://github.com/jabberd2/jabberd2/issues/85
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression)
https://ubuntu.com/security/notices/USN-3068-1
libidn CVE-2015-8948 LOW 1.28-4.el7
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-8948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://marc.info/?l=oss-security&m=146910769415616&w=2
https://ubuntu.com/security/notices/USN-3068-1
libidn CVE-2016-6261 LOW 1.28-4.el7
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
libidn CVE-2016-6262 LOW 1.28-4.el7
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://ubuntu.com/security/notices/USN-3068-1
libidn CVE-2016-6263 LOW 1.28-4.el7
Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://security.gentoo.org/glsa/201908-06
https://ubuntu.com/security/notices/USN-3068-1
libidn CVE-2017-14062 LOW 1.28-4.el7
Expand...http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
libkadm5 CVE-2014-5351 MEDIUM 1.15.1-46.el7
Expand...http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://ubuntu.com/security/notices/USN-2498-1
libkadm5 CVE-2015-2695 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
libkadm5 CVE-2015-2696 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
libkadm5 CVE-2015-2697 MEDIUM 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
libkadm5 CVE-2017-15088 MEDIUM 1.15.1-46.el7
Expand...http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
libkadm5 CVE-2020-17049 MEDIUM 1.15.1-46.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/security/cve/CVE-2020-17049
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
libkadm5 CVE-2020-28196 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
libkadm5 CVE-2021-36222 MEDIUM 1.15.1-46.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
libkadm5 CVE-2021-37750 MEDIUM 1.15.1-46.el7 1.15.1-51.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkadm5 CVE-2017-11462 LOW 1.15.1-46.el7
Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
libmount CVE-2014-9114 MEDIUM 2.23.2-61.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
libmount CVE-2016-2779 MEDIUM 2.23.2-61.el7
Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
libmount CVE-2022-0563 MEDIUM 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libmount CVE-2015-5218 LOW 2.23.2-61.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
libmount CVE-2021-37600 LOW 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libpng CVE-2015-8540 LOW 2:1.5.13-8.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
http://sourceforge.net/p/libpng/bugs/244/
http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
http://www.debian.org/security/2016/dsa-3443
http://www.openwall.com/lists/oss-security/2015/12/10/6
http://www.openwall.com/lists/oss-security/2015/12/10/7
http://www.openwall.com/lists/oss-security/2015/12/11/1
http://www.openwall.com/lists/oss-security/2015/12/11/2
http://www.openwall.com/lists/oss-security/2015/12/17/10
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/80592
https://access.redhat.com/errata/RHSA-2016:1430
https://access.redhat.com/security/cve/CVE-2015-8540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201611-08
https://ubuntu.com/security/notices/USN-2861-1
libpng CVE-2016-10087 LOW 2:1.5.13-8.el7
Expand...http://www.openwall.com/lists/oss-security/2016/12/29/2
http://www.openwall.com/lists/oss-security/2016/12/30/4
http://www.securityfocus.com/bid/95157
https://access.redhat.com/security/cve/CVE-2016-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-74
https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba
https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12)
https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16)
https://ubuntu.com/security/notices/USN-3712-1
https://ubuntu.com/security/notices/USN-3712-2
https://usn.ubuntu.com/3712-1/
https://usn.ubuntu.com/3712-2/
libquadmath CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libquadmath CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libquadmath CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libquadmath CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libquadmath CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libquadmath CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libquadmath CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libquadmath CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libquadmath CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libquadmath CVE-2021-3114 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114
https://github.com/golang/go/commit/d95ca9138026cbe40e0857d76a81a16d03230871
https://groups.google.com/g/golang-announce/c/mperVMGa98w
https://linux.oracle.com/cve/CVE-2021-3114.html
https://linux.oracle.com/errata/ELSA-2021-4226.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3114
https://security.netapp.com/advisory/ntap-20210219-0001/
https://www.debian.org/security/2021/dsa-4848
libquadmath CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libquadmath CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libquadmath CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libquadmath CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libquadmath CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libquadmath CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libquadmath CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libquadmath CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libquadmath CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libsepol CVE-2021-36084 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol CVE-2021-36085 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol CVE-2021-36086 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol CVE-2021-36087 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
libsepol-devel CVE-2021-36084 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol-devel CVE-2021-36085 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol-devel CVE-2021-36086 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol-devel CVE-2021-36087 MEDIUM 2.5-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
libssh2 CVE-2019-13115 MEDIUM 1.8.0-3.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
libssh2 CVE-2019-17498 MEDIUM 1.8.0-3.el7 1.8.0-4.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
libssh2 CVE-2019-3859 MEDIUM 1.8.0-3.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://www.openwall.com/lists/oss-security/2019/03/18/3
http://www.securityfocus.com/bid/107485
https://access.redhat.com/security/cve/CVE-2019-3859
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859
https://github.com/libssh2/libssh2/pull/315
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
https://seclists.org/bugtraq/2019/Apr/25
https://seclists.org/bugtraq/2019/Mar/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3859.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libssh2 CVE-2019-3860 MEDIUM 1.8.0-3.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
https://access.redhat.com/security/cve/CVE-2019-3860
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860
https://github.com/libssh2/libssh2/pull/316
https://libssh2.org/CVE-2019-3860.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://seclists.org/bugtraq/2019/Apr/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3860.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libstdc++ CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libstdc++ CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libstdc++ CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libstdc++ CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libstdc++ CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libstdc++ CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libstdc++ CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libstdc++ CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libstdc++ CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libstdc++ CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libstdc++ CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libstdc++ CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libstdc++ CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libstdc++ CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libstdc++ CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++ CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libstdc++ CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libstdc++ CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libstdc++-devel CVE-2014-5044 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
libstdc++-devel CVE-2018-20673 MEDIUM 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
libstdc++-devel CVE-2019-16276 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276
https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13)
https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12)
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://security.netapp.com/advisory/ntap-20191122-0004/
libstdc++-devel CVE-2020-16845 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/advisories/GHSA-q6gq-997w-f55g
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002/
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
libstdc++-devel CVE-2020-24553 MEDIUM 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
libstdc++-devel CVE-2020-28362 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
libstdc++-devel CVE-2020-28366 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://github.com/golang/go/issues/42559
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://security.netapp.com/advisory/ntap-20201202-0004/
libstdc++-devel CVE-2020-28367 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://github.com/golang/go/issues/42556
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://security.netapp.com/advisory/ntap-20201202-0004/
libstdc++-devel CVE-2021-27918 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
libstdc++-devel CVE-2021-42574 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
libstdc++-devel CVE-2021-42694 MEDIUM 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://trojansource.codes
https://trojansource.codes/
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
libstdc++-devel CVE-2022-27943 MEDIUM 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
libstdc++-devel CVE-2015-5276 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
libstdc++-devel CVE-2016-2226 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.exploit-db.com/exploits/42386/
libstdc++-devel CVE-2016-4487 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4488 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4489 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4490 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4491 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4492 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2016-4493 LOW 4.8.5-39.el7
Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
libstdc++-devel CVE-2018-20657 LOW 4.8.5-39.el7
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
libstdc++-devel CVE-2019-14250 LOW 4.8.5-39.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
libstdc++-devel CVE-2021-46195 LOW 4.8.5-39.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-46195
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
libtasn1 CVE-2016-4008 MEDIUM 4.10-1.el7
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
http://www.debian.org/security/2016/dsa-3568
http://www.openwall.com/lists/oss-security/2016/04/11/3
http://www.ubuntu.com/usn/USN-2957-1
http://www.ubuntu.com/usn/USN-2957-2
https://access.redhat.com/security/cve/CVE-2016-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008
https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
https://security.gentoo.org/glsa/201703-05
https://ubuntu.com/security/notices/USN-2957-1
https://ubuntu.com/security/notices/USN-2957-2
libtasn1 CVE-2018-6003 MEDIUM 4.10-1.el7
Expand...http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
https://access.redhat.com/security/cve/CVE-2018-6003
https://bugzilla.redhat.com/show_bug.cgi?id=1535926
https://bugzilla.suse.com/show_bug.cgi?id=1076832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3547-1
https://www.debian.org/security/2018/dsa-4106
libtasn1 CVE-2017-10790 LOW 4.10-1.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.debian.org/security/2018/dsa-4106
libtasn1 CVE-2017-6891 LOW 4.10-1.el7
Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.debian.org/security/2017/dsa-3861
http://www.securityfocus.com/bid/98641
http://www.securitytracker.com/id/1038619
https://access.redhat.com/security/cve/CVE-2017-6891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://secuniaresearch.flexerasoftware.com/advisories/76125/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3309-1
https://ubuntu.com/security/notices/USN-3309-2
libtasn1 CVE-2018-1000654 LOW 4.10-1.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
libuuid CVE-2014-9114 MEDIUM 2.23.2-61.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
libuuid CVE-2016-2779 MEDIUM 2.23.2-61.el7
Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
libuuid CVE-2022-0563 MEDIUM 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
libuuid CVE-2015-5218 LOW 2.23.2-61.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
libuuid CVE-2021-37600 LOW 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
libxml2 CVE-2015-8035 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://www.debian.org/security/2015/dsa-3430
http://www.openwall.com/lists/oss-security/2015/11/02/2
http://www.openwall.com/lists/oss-security/2015/11/02/4
http://www.openwall.com/lists/oss-security/2015/11/03/1
http://www.securityfocus.com/bid/77390
http://www.securitytracker.com/id/1034243
http://www.ubuntu.com/usn/USN-2812-1
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2015-8035
https://bugzilla.gnome.org/show_bug.cgi?id=757466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://linux.oracle.com/cve/CVE-2015-8035.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206166
https://support.apple.com/HT206167
https://support.apple.com/HT206168
https://support.apple.com/HT206169
https://ubuntu.com/security/notices/USN-2812-1
libxml2 CVE-2016-4483 MEDIUM 2.9.1-6.el7_2.3
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.tenable.com/security/tns-2016-18
libxml2 CVE-2016-4658 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7_9.6
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2016-4658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
https://github.com/advisories/GHSA-fr52-4hqw-p27f
https://github.com/sparklemotion/nokogiri/issues/1615
https://linux.oracle.com/cve/CVE-2016-4658.html
https://linux.oracle.com/errata/ELSA-2021-3810.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4658
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3235-1
libxml2 CVE-2016-5131 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.debian.org/security/2016/dsa-3637
http://www.securityfocus.com/bid/92053
http://www.securitytracker.com/id/1036428
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-3041-1
https://access.redhat.com/security/cve/CVE-2016-5131
https://bugzilla.redhat.com/show_bug.cgi?id=1358641
https://codereview.chromium.org/2127493002
https://crbug.com/623378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://linux.oracle.com/cve/CVE-2016-5131.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201610-09
https://security.gentoo.org/glsa/201701-37
https://source.android.com/security/bulletin/2017-05-01
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3041-1
https://ubuntu.com/security/notices/USN-3235-1
libxml2 CVE-2016-9318 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2 CVE-2017-0663 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-15412 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://www.securitytracker.com/id/1040348
https://access.redhat.com/errata/RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2018:0287
https://access.redhat.com/security/cve/CVE-2017-15412
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
https://github.com/sparklemotion/nokogiri/issues/1714
https://linux.oracle.com/cve/CVE-2017-15412.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html
https://security.gentoo.org/glsa/201801-03
https://ubuntu.com/security/notices/USN-3513-1
https://ubuntu.com/security/notices/USN-3513-2
https://usn.ubuntu.com/usn/usn-3513-1/
https://www.debian.org/security/2018/dsa-4086
libxml2 CVE-2017-16931 MEDIUM 2.9.1-6.el7_2.3
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16931
https://bugzilla.gnome.org/show_bug.cgi?id=766956
https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
libxml2 CVE-2017-16932 MEDIUM 2.9.1-6.el7_2.3
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2 CVE-2017-7375 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
libxml2 CVE-2017-9047 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-9049 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2017-9050 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/advisories/GHSA-8c56-cpmw-89x7
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
libxml2 CVE-2018-14404 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-14404
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404
https://github.com/advisories/GHSA-6qvp-r6r3-9p7h
https://github.com/sparklemotion/nokogiri/issues/1785
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
https://linux.oracle.com/cve/CVE-2018-14404.html
https://linux.oracle.com/errata/ELSA-2020-1827.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14404
https://security.netapp.com/advisory/ntap-20190719-0002/
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2 CVE-2019-19956 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
https://access.redhat.com/security/cve/CVE-2019-19956
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956
https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
https://linux.oracle.com/cve/CVE-2019-19956.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://security.netapp.com/advisory/ntap-20200114-0002/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpujul2020.html
libxml2 CVE-2019-20388 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2019-20388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388
https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
https://linux.oracle.com/cve/CVE-2019-20388.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2019-20388
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2020-24977 MEDIUM 2.9.1-6.el7_2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
https://access.redhat.com/security/cve/CVE-2020-24977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
https://linux.oracle.com/cve/CVE-2020-24977.html
https://linux.oracle.com/errata/ELSA-2021-1597.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
https://nvd.nist.gov/vuln/detail/CVE-2020-24977
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20200924-0001/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2020-7595 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-7595
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
https://github.com/advisories/GHSA-7553-jr98-vx47
https://github.com/sparklemotion/nokogiri/issues/1992
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
https://linux.oracle.com/cve/CVE-2020-7595.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2020-7595
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3516 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2 CVE-2021-3517 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3518 MEDIUM 2.9.1-6.el7_2.3
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3537 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2 CVE-2021-3541 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2 CVE-2022-23308 MEDIUM 2.9.1-6.el7_2.3
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
libxml2 CVE-2022-29824 MEDIUM 2.9.1-6.el7_2.3
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
libxml2 CVE-2017-18258 LOW 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...https://access.redhat.com/security/cve/CVE-2017-18258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
https://github.com/advisories/GHSA-882p-jqgm-f45g
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2017-18258.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18258
https://security.netapp.com/advisory/ntap-20190719-0001/
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
libxml2 CVE-2017-5969 LOW 2.9.1-6.el7_2.3
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
libxml2 CVE-2017-8872 LOW 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/security/cve/CVE-2017-8872
https://bugzilla.gnome.org/show_bug.cgi?id=775200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-4991-1
libxml2 CVE-2017-9048 LOW 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2 CVE-2018-14567 LOW 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://www.securityfocus.com/bid/105198
https://access.redhat.com/security/cve/CVE-2018-14567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://linux.oracle.com/cve/CVE-2018-14567.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
libxml2-python CVE-2015-8035 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://www.debian.org/security/2015/dsa-3430
http://www.openwall.com/lists/oss-security/2015/11/02/2
http://www.openwall.com/lists/oss-security/2015/11/02/4
http://www.openwall.com/lists/oss-security/2015/11/03/1
http://www.securityfocus.com/bid/77390
http://www.securitytracker.com/id/1034243
http://www.ubuntu.com/usn/USN-2812-1
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2015-8035
https://bugzilla.gnome.org/show_bug.cgi?id=757466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://linux.oracle.com/cve/CVE-2015-8035.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT206166
https://support.apple.com/HT206167
https://support.apple.com/HT206168
https://support.apple.com/HT206169
https://ubuntu.com/security/notices/USN-2812-1
libxml2-python CVE-2016-4483 MEDIUM 2.9.1-6.el7_2.3
Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.tenable.com/security/tns-2016-18
libxml2-python CVE-2016-4658 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7_9.6
Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2016-4658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
https://github.com/advisories/GHSA-fr52-4hqw-p27f
https://github.com/sparklemotion/nokogiri/issues/1615
https://linux.oracle.com/cve/CVE-2016-4658.html
https://linux.oracle.com/errata/ELSA-2021-3810.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4658
https://security.gentoo.org/glsa/201701-37
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3235-1
libxml2-python CVE-2016-5131 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.debian.org/security/2016/dsa-3637
http://www.securityfocus.com/bid/92053
http://www.securitytracker.com/id/1036428
http://www.securitytracker.com/id/1038623
http://www.ubuntu.com/usn/USN-3041-1
https://access.redhat.com/security/cve/CVE-2016-5131
https://bugzilla.redhat.com/show_bug.cgi?id=1358641
https://codereview.chromium.org/2127493002
https://crbug.com/623378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
https://linux.oracle.com/cve/CVE-2016-5131.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://security.gentoo.org/glsa/201610-09
https://security.gentoo.org/glsa/201701-37
https://source.android.com/security/bulletin/2017-05-01
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3041-1
https://ubuntu.com/security/notices/USN-3235-1
libxml2-python CVE-2016-9318 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2-python CVE-2017-0663 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2-python CVE-2017-15412 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://www.securitytracker.com/id/1040348
https://access.redhat.com/errata/RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2018:0287
https://access.redhat.com/security/cve/CVE-2017-15412
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
https://github.com/sparklemotion/nokogiri/issues/1714
https://linux.oracle.com/cve/CVE-2017-15412.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html
https://security.gentoo.org/glsa/201801-03
https://ubuntu.com/security/notices/USN-3513-1
https://ubuntu.com/security/notices/USN-3513-2
https://usn.ubuntu.com/usn/usn-3513-1/
https://www.debian.org/security/2018/dsa-4086
libxml2-python CVE-2017-16931 MEDIUM 2.9.1-6.el7_2.3
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16931
https://bugzilla.gnome.org/show_bug.cgi?id=766956
https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
libxml2-python CVE-2017-16932 MEDIUM 2.9.1-6.el7_2.3
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
libxml2-python CVE-2017-7375 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.debian.org/security/2017/dsa-3952
libxml2-python CVE-2017-9047 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2-python CVE-2017-9049 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2-python CVE-2017-9050 MEDIUM 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/advisories/GHSA-8c56-cpmw-89x7
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
libxml2-python CVE-2018-14404 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/security/cve/CVE-2018-14404
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404
https://github.com/advisories/GHSA-6qvp-r6r3-9p7h
https://github.com/sparklemotion/nokogiri/issues/1785
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
https://linux.oracle.com/cve/CVE-2018-14404.html
https://linux.oracle.com/errata/ELSA-2020-1827.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14404
https://security.netapp.com/advisory/ntap-20190719-0002/
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
libxml2-python CVE-2019-19956 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html
https://access.redhat.com/security/cve/CVE-2019-19956
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956
https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
https://linux.oracle.com/cve/CVE-2019-19956.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://security.netapp.com/advisory/ntap-20200114-0002/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpujul2020.html
libxml2-python CVE-2019-20388 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2019-20388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388
https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
https://linux.oracle.com/cve/CVE-2019-20388.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2019-20388
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2020-24977 MEDIUM 2.9.1-6.el7_2.3
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
https://access.redhat.com/security/cve/CVE-2020-24977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
https://linux.oracle.com/cve/CVE-2020-24977.html
https://linux.oracle.com/errata/ELSA-2021-1597.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
https://nvd.nist.gov/vuln/detail/CVE-2020-24977
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20200924-0001/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2020-7595 MEDIUM 2.9.1-6.el7_2.3 2.9.1-6.el7.5
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-7595
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
https://github.com/advisories/GHSA-7553-jr98-vx47
https://github.com/sparklemotion/nokogiri/issues/1992
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
https://linux.oracle.com/cve/CVE-2020-7595.html
https://linux.oracle.com/errata/ELSA-2020-4479.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://nvd.nist.gov/vuln/detail/CVE-2020-7595
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2021-3516 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2-python CVE-2021-3517 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2021-3518 MEDIUM 2.9.1-6.el7_2.3
Expand...http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2021-3537 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libxml2-python CVE-2021-3541 MEDIUM 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.oracle.com/security-alerts/cpujan2022.html
libxml2-python CVE-2022-23308 MEDIUM 2.9.1-6.el7_2.3
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
libxml2-python CVE-2022-29824 MEDIUM 2.9.1-6.el7_2.3
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
libxml2-python CVE-2017-18258 LOW 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...https://access.redhat.com/security/cve/CVE-2017-18258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
https://github.com/advisories/GHSA-882p-jqgm-f45g
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2017-18258.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18258
https://security.netapp.com/advisory/ntap-20190719-0001/
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
libxml2-python CVE-2017-5969 LOW 2.9.1-6.el7_2.3
Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
libxml2-python CVE-2017-8872 LOW 2.9.1-6.el7_2.3
Expand...https://access.redhat.com/security/cve/CVE-2017-8872
https://bugzilla.gnome.org/show_bug.cgi?id=775200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-4991-1
libxml2-python CVE-2017-9048 LOW 2.9.1-6.el7_2.3
Expand...http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
libxml2-python CVE-2018-14567 LOW 2.9.1-6.el7_2.3 2.9.1-6.el7.4
Expand...http://www.securityfocus.com/bid/105198
https://access.redhat.com/security/cve/CVE-2018-14567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
https://linux.oracle.com/cve/CVE-2018-14567.html
https://linux.oracle.com/errata/ELSA-2020-1190.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
lua CVE-2014-5461 MEDIUM 5.1.4-15.el7
Expand...http://advisories.mageia.org/MGASA-2014-0414.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html
http://secunia.com/advisories/59890
http://secunia.com/advisories/60869
http://secunia.com/advisories/61411
http://www.debian.org/security/2014/dsa-3015
http://www.debian.org/security/2014/dsa-3016
http://www.lua.org/bugs.html#5.2.2-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:144
http://www.openwall.com/lists/oss-security/2014/08/21/1
http://www.openwall.com/lists/oss-security/2014/08/21/4
http://www.openwall.com/lists/oss-security/2014/08/27/2
http://www.securityfocus.com/bid/69342
http://www.ubuntu.com/usn/USN-2338-1
https://access.redhat.com/security/cve/CVE-2014-5461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461
https://security.gentoo.org/glsa/201701-53
https://ubuntu.com/security/notices/USN-2338-1
lua CVE-2021-43519 MEDIUM 5.1.4-15.el7
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
https://access.redhat.com/security/cve/CVE-2021-43519
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
https://nvd.nist.gov/vuln/detail/CVE-2021-43519
lz4 CVE-2019-17543 MEDIUM 1.7.5-3.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
lz4 CVE-2021-3520 MEDIUM 1.7.5-3.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json
https://access.redhat.com/security/cve/CVE-2021-3520
https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://errata.almalinux.org/8/ALSA-2021-2575.html
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
mesa-dri-drivers CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-filesystem CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libEGL CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libGL CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libGL-devel CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libOSMesa CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libOSMesa-devel CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libgbm CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mesa-libglapi CVE-2019-5068 MEDIUM 18.3.4-12.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
https://access.redhat.com/security/cve/CVE-2019-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068
https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
https://ubuntu.com/security/notices/USN-4271-1
https://usn.ubuntu.com/4271-1/
https://www.mesa3d.org/relnotes/19.1.8.html
mpfr CVE-2014-9474 LOW 3.1.1-4.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147737.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147745.html
http://www.mpfr.org/mpfr-3.1.2/patch11
http://www.openwall.com/lists/oss-security/2015/01/03/12
http://www.securityfocus.com/bid/71542
https://access.redhat.com/security/cve/CVE-2014-9474
https://bugzilla.redhat.com/show_bug.cgi?id=1171701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474
https://gforge.inria.fr/scm/viewvc.php/mpfr?revision=9243&view=revision
https://gforge.inria.fr/scm/viewvc.php?view=rev&root=mpfr&revision=9243
https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html
https://security.gentoo.org/glsa/201512-06
nasm CVE-2017-10686 MEDIUM 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-10686
https://bugzilla.nasm.us/show_bug.cgi?id=3392414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10686
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-11111 MEDIUM 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-11111
https://bugzilla.nasm.us/show_bug.cgi?id=3392415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11111
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-14228 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-14228
https://bugzilla.nasm.us/show_bug.cgi?id=3392423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14228
https://security.gentoo.org/glsa/201903-19
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17810 LOW 2.10.07-7.el7
Expand...http://repo.or.cz/nasm.git/commit/59ce1c67b16967c652765e62aa130b7e43f21dd4
https://access.redhat.com/security/cve/CVE-2017-17810
https://bugzilla.nasm.us/show_bug.cgi?id=3392431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17810
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17811 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17811
https://bugzilla.nasm.us/show_bug.cgi?id=3392432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17811
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17812 LOW 2.10.07-7.el7
Expand...http://repo.or.cz/nasm.git/commit/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
https://access.redhat.com/security/cve/CVE-2017-17812
https://bugzilla.nasm.us/show_bug.cgi?id=3392424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17812
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17813 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17813
https://bugzilla.nasm.us/show_bug.cgi?id=3392429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17813
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17814 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17814
https://bugzilla.nasm.us/show_bug.cgi?id=3392430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17814
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17815 LOW 2.10.07-7.el7
Expand...http://repo.or.cz/nasm.git/commit/c9244eaadd05b27637cde06021bac3fa1d920aa3
https://access.redhat.com/security/cve/CVE-2017-17815
https://bugzilla.nasm.us/show_bug.cgi?id=3392436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17815
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17816 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17816
https://bugzilla.nasm.us/show_bug.cgi?id=3392426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17816
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17817 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17817
https://bugzilla.nasm.us/show_bug.cgi?id=3392427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17817
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17818 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17818
https://bugzilla.nasm.us/show_bug.cgi?id=3392428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17818
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17819 LOW 2.10.07-7.el7
Expand...http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af
https://access.redhat.com/security/cve/CVE-2017-17819
https://bugzilla.nasm.us/show_bug.cgi?id=3392435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17819
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2017-17820 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-17820
https://bugzilla.nasm.us/show_bug.cgi?id=3392433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17820
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2018-1000667 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-1000667
https://bugzilla.nasm.us/show_bug.cgi?id=3392507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667
https://github.com/cyrillos/nasm/issues/3
nasm CVE-2018-1000886 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-1000886
https://bugzilla.nasm.us/show_bug.cgi?id=3392514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000886
nasm CVE-2018-10016 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10016
https://bugzilla.nasm.us/show_bug.cgi?id=3392473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016
nasm CVE-2018-10254 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254
https://sourceforge.net/p/nasm/bugs/561/
nasm CVE-2018-10316 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-10316
https://bugzilla.nasm.us/show_bug.cgi?id=3392474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316
nasm CVE-2018-16382 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-16382
https://bugzilla.nasm.us/show_bug.cgi?id=3392503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382
nasm CVE-2018-19213 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-19213
https://bugzilla.nasm.us/show_bug.cgi?id=3392524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19213
nasm CVE-2018-19214 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-19214
https://bugzilla.nasm.us/show_bug.cgi?id=3392521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214
https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
nasm CVE-2018-19215 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-19215
https://bugzilla.nasm.us/show_bug.cgi?id=3392525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215
https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
nasm CVE-2018-19755 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-19755
https://bugzilla.nasm.us/show_bug.cgi?id=3392528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19755
https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb
nasm CVE-2018-20535 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-20535
https://bugzilla.nasm.us/show_bug.cgi?id=3392530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20535
nasm CVE-2018-20538 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-20538
https://bugzilla.nasm.us/show_bug.cgi?id=3392531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20538
nasm CVE-2018-8881 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8881
https://bugzilla.nasm.us/show_bug.cgi?id=3392446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8881
https://ubuntu.com/security/notices/USN-3694-1
https://usn.ubuntu.com/3694-1/
nasm CVE-2018-8882 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8882
https://bugzilla.nasm.us/show_bug.cgi?id=3392445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882
nasm CVE-2018-8883 LOW 2.10.07-7.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
https://access.redhat.com/security/cve/CVE-2018-8883
https://bugzilla.nasm.us/show_bug.cgi?id=3392447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883
nasm CVE-2019-20334 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-20334
https://bugzilla.nasm.us/show_bug.cgi?id=3392548#c4
https://bugzilla.nasm.us/show_bug.cgi?id=3392638
nasm CVE-2019-20352 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-20352
https://bugzilla.nasm.us/show_bug.cgi?id=3392636
nasm CVE-2019-6290 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6290
https://bugzilla.nasm.us/show_bug.cgi?id=3392548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6290
nasm CVE-2019-6291 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6291
https://bugzilla.nasm.us/show_bug.cgi?id=3392549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6291
nasm CVE-2019-8343 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-8343
https://bugzilla.nasm.us/show_bug.cgi?id=3392556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8343
nasm CVE-2020-18974 LOW 2.10.07-7.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-18974
https://bugzilla.nasm.us/show_bug.cgi?id=3392568
ncurses CVE-2017-10684 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-10685 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2019-17594 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses CVE-2019-17595 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses CVE-2021-39537 MEDIUM 5.9-14.20130511.el7_4
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
ncurses CVE-2017-11112 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-11113 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13728 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13729 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13730 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13731 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13732 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13733 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-13734 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses CVE-2017-16879 LOW 5.9-14.20130511.el7_4
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
ncurses CVE-2018-19211 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
ncurses CVE-2018-19217 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
ncurses-base CVE-2017-10684 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-10685 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2019-17594 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses-base CVE-2019-17595 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses-base CVE-2021-39537 MEDIUM 5.9-14.20130511.el7_4
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
ncurses-base CVE-2017-11112 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-11113 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13728 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13729 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13730 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13731 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13732 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13733 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-13734 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-base CVE-2017-16879 LOW 5.9-14.20130511.el7_4
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
ncurses-base CVE-2018-19211 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
ncurses-base CVE-2018-19217 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
ncurses-libs CVE-2017-10684 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-10685 MEDIUM 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2019-17594 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses-libs CVE-2019-17595 MEDIUM 5.9-14.20130511.el7_4
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
ncurses-libs CVE-2021-39537 MEDIUM 5.9-14.20130511.el7_4
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
ncurses-libs CVE-2017-11112 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-11113 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13728 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13729 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13730 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13731 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13732 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13733 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-13734 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
ncurses-libs CVE-2017-16879 LOW 5.9-14.20130511.el7_4
Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
ncurses-libs CVE-2018-19211 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
ncurses-libs CVE-2018-19217 LOW 5.9-14.20130511.el7_4
Expand...https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
nspr CVE-2016-1951 MEDIUM 4.21.0-1.el7
Expand...http://www.securityfocus.com/bid/92385
http://www.securitytracker.com/id/1036590
http://www.ubuntu.com/usn/USN-3023-1
https://access.redhat.com/security/cve/CVE-2016-1951
https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951
https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/dV4MyMsg6jw
https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ
https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2
https://ubuntu.com/security/notices/USN-3023-1
https://ubuntu.com/security/notices/USN-3028-1
nspr CVE-2019-11719 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nspr CVE-2019-11756 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nspr CVE-2019-17006 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nspr CVE-2020-12400 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nspr CVE-2020-12401 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nspr CVE-2020-12402 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nspr CVE-2020-12403 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nspr CVE-2020-6829 MEDIUM 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nspr CVE-2019-11727 LOW 4.21.0-1.el7 4.25.0-2.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nspr CVE-2019-17023 LOW 4.21.0-1.el7 4.25.0-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss CVE-2021-43527 CRITICAL 3.44.0-4.el7 3.67.0-4.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
nss CVE-2019-11745 HIGH 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss CVE-2015-2808 MEDIUM 3.44.0-4.el7
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
nss CVE-2016-2183 MEDIUM 3.44.0-4.el7
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
nss CVE-2016-9074 MEDIUM 3.44.0-4.el7
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
nss CVE-2016-9574 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
nss CVE-2018-18508 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss CVE-2019-11719 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss CVE-2019-11729 MEDIUM 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss CVE-2019-11756 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss CVE-2019-17006 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss CVE-2020-12399 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
nss CVE-2020-12400 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss CVE-2020-12401 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss CVE-2020-12402 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss CVE-2020-12403 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss CVE-2020-25648 MEDIUM 3.44.0-4.el7 3.53.1-7.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
nss CVE-2020-6829 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss CVE-2019-11727 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss CVE-2019-17023 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss CVE-2020-12413 LOW 3.44.0-4.el7
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
nss-softokn CVE-2019-11745 HIGH 3.44.0-5.el7 3.44.0-8.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss-softokn CVE-2015-2613 MEDIUM 3.44.0-5.el7
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
nss-softokn CVE-2017-7781 MEDIUM 3.44.0-5.el7
Expand...http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
nss-softokn CVE-2019-11719 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-softokn CVE-2019-11729 MEDIUM 3.44.0-5.el7 3.44.0-8.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-softokn CVE-2019-11756 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss-softokn CVE-2019-17006 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-softokn CVE-2020-12400 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn CVE-2020-12401 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn CVE-2020-12402 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss-softokn CVE-2020-12403 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss-softokn CVE-2020-6829 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn CVE-2016-1938 LOW 3.44.0-5.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
nss-softokn CVE-2019-11727 LOW 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss-softokn CVE-2019-17023 LOW 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss-softokn-freebl CVE-2019-11745 HIGH 3.44.0-5.el7 3.44.0-8.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss-softokn-freebl CVE-2015-2613 MEDIUM 3.44.0-5.el7
Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
nss-softokn-freebl CVE-2017-7781 MEDIUM 3.44.0-5.el7
Expand...http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
nss-softokn-freebl CVE-2019-11719 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-softokn-freebl CVE-2019-11729 MEDIUM 3.44.0-5.el7 3.44.0-8.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-softokn-freebl CVE-2019-11756 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss-softokn-freebl CVE-2019-17006 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-softokn-freebl CVE-2020-12400 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn-freebl CVE-2020-12401 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn-freebl CVE-2020-12402 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss-softokn-freebl CVE-2020-12403 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss-softokn-freebl CVE-2020-6829 MEDIUM 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-softokn-freebl CVE-2016-1938 LOW 3.44.0-5.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
nss-softokn-freebl CVE-2019-11727 LOW 3.44.0-5.el7 3.53.1-6.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss-softokn-freebl CVE-2019-17023 LOW 3.44.0-5.el7 3.53.1-6.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss-sysinit CVE-2021-43527 CRITICAL 3.44.0-4.el7 3.67.0-4.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
nss-sysinit CVE-2019-11745 HIGH 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss-sysinit CVE-2015-2808 MEDIUM 3.44.0-4.el7
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
nss-sysinit CVE-2016-2183 MEDIUM 3.44.0-4.el7
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
nss-sysinit CVE-2016-9074 MEDIUM 3.44.0-4.el7
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
nss-sysinit CVE-2016-9574 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
nss-sysinit CVE-2018-18508 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-sysinit CVE-2019-11719 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-sysinit CVE-2019-11729 MEDIUM 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-sysinit CVE-2019-11756 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss-sysinit CVE-2019-17006 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-sysinit CVE-2020-12399 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
nss-sysinit CVE-2020-12400 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-sysinit CVE-2020-12401 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-sysinit CVE-2020-12402 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss-sysinit CVE-2020-12403 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss-sysinit CVE-2020-25648 MEDIUM 3.44.0-4.el7 3.53.1-7.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
nss-sysinit CVE-2020-6829 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-sysinit CVE-2019-11727 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss-sysinit CVE-2019-17023 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss-sysinit CVE-2020-12413 LOW 3.44.0-4.el7
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
nss-tools CVE-2021-43527 CRITICAL 3.44.0-4.el7 3.67.0-4.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json
https://access.redhat.com/security/cve/CVE-2021-43527
https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-9591.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43527
https://security.netapp.com/advisory/ntap-20211229-0002/
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://ubuntu.com/security/notices/USN-5168-4
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.mozilla.org/security/advisories/mfsa2021-51/
https://www.oracle.com/security-alerts/cpuapr2022.html
nss-tools CVE-2019-11745 HIGH 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss-tools CVE-2015-2808 MEDIUM 3.44.0-4.el7
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
nss-tools CVE-2016-2183 MEDIUM 3.44.0-4.el7
Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
nss-tools CVE-2016-9074 MEDIUM 3.44.0-4.el7
Expand...http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
nss-tools CVE-2016-9574 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
nss-tools CVE-2018-18508 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-tools CVE-2019-11719 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-tools CVE-2019-11729 MEDIUM 3.44.0-4.el7 3.44.0-7.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-tools CVE-2019-11756 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss-tools CVE-2019-17006 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-tools CVE-2020-12399 MEDIUM 3.44.0-4.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-12399
https://bugzilla.mozilla.org/show_bug.cgi?id=1631576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202007-49
https://ubuntu.com/security/notices/USN-4383-1
https://ubuntu.com/security/notices/USN-4397-1
https://ubuntu.com/security/notices/USN-4397-2
https://ubuntu.com/security/notices/USN-4421-1
https://usn.ubuntu.com/4421-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399
https://www.mozilla.org/security/advisories/mfsa2020-20/
https://www.mozilla.org/security/advisories/mfsa2020-21/
https://www.mozilla.org/security/advisories/mfsa2020-22/
nss-tools CVE-2020-12400 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-tools CVE-2020-12401 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-tools CVE-2020-12402 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss-tools CVE-2020-12403 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss-tools CVE-2020-25648 MEDIUM 3.44.0-4.el7 3.53.1-7.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json
https://access.redhat.com/security/cve/CVE-2020-25648
https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://ubuntu.com/security/notices/USN-5410-1
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
nss-tools CVE-2020-6829 MEDIUM 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-tools CVE-2019-11727 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss-tools CVE-2019-17023 LOW 3.44.0-4.el7 3.53.1-3.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
nss-tools CVE-2020-12413 LOW 3.44.0-4.el7
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-12413
nss-util CVE-2019-11745 HIGH 3.44.0-3.el7 3.44.0-4.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2020:0243
https://access.redhat.com/errata/RHSA-2020:0466
https://access.redhat.com/security/cve/CVE-2019-11745
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes
https://linux.oracle.com/cve/CVE-2019-11745.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/202003-02
https://security.gentoo.org/glsa/202003-10
https://security.gentoo.org/glsa/202003-37
https://ubuntu.com/security/notices/USN-4203-1
https://ubuntu.com/security/notices/USN-4203-2
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://ubuntu.com/security/notices/USN-4241-1
https://ubuntu.com/security/notices/USN-4335-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://usn.ubuntu.com/4241-1/
https://usn.ubuntu.com/4335-1/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745
https://www.mozilla.org/security/advisories/mfsa2019-36/
https://www.mozilla.org/security/advisories/mfsa2019-37/
https://www.mozilla.org/security/advisories/mfsa2019-38/
nss-util CVE-2019-11719 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11719
https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
https://linux.oracle.com/cve/CVE-2019-11719.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-util CVE-2019-11729 MEDIUM 3.44.0-3.el7 3.44.0-4.el7_7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/errata/RHSA-2019:4190
https://access.redhat.com/security/cve/CVE-2019-11729
https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
https://linux.oracle.com/cve/CVE-2019-11729.html
https://linux.oracle.com/errata/ELSA-2019-4190.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://security.gentoo.org/glsa/201908-12
https://security.gentoo.org/glsa/201908-20
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://ubuntu.com/security/notices/USN-4060-2
https://ubuntu.com/security/notices/USN-4064-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729
https://www.mozilla.org/security/advisories/mfsa2019-21/
https://www.mozilla.org/security/advisories/mfsa2019-22/
https://www.mozilla.org/security/advisories/mfsa2019-23/
nss-util CVE-2019-11756 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-11756
https://bugzilla.mozilla.org/show_bug.cgi?id=1508776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes
https://linux.oracle.com/cve/CVE-2019-11756.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4216-1
https://ubuntu.com/security/notices/USN-4216-2
https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756
https://www.mozilla.org/security/advisories/mfsa2019-36/
nss-util CVE-2019-17006 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17006
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe
https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34
https://linux.oracle.com/cve/CVE-2019-17006.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.netapp.com/advisory/ntap-20210129-0001/
https://ubuntu.com/security/notices/USN-4231-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
nss-util CVE-2020-12400 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12400
https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-util CVE-2020-12401 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12401
https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-util CVE-2020-12402 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2020-12402
https://bugzilla.mozilla.org/show_bug.cgi?id=1631597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes
https://linux.oracle.com/cve/CVE-2020-12402.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/
https://security.gentoo.org/glsa/202007-10
https://ubuntu.com/security/notices/USN-4417-1
https://ubuntu.com/security/notices/USN-4417-2
https://usn.ubuntu.com/4417-1/
https://usn.ubuntu.com/4417-2/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/security/advisories/mfsa2020-24/
nss-util CVE-2020-12403 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12403
https://ubuntu.com/security/notices/USN-4476-1
nss-util CVE-2020-6829 MEDIUM 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-6829
https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
nss-util CVE-2019-11727 LOW 3.44.0-3.el7 3.53.1-1.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
https://access.redhat.com/errata/RHSA-2019:1951
https://access.redhat.com/security/cve/CVE-2019-11727
https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
https://linux.oracle.com/cve/CVE-2019-11727.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://security.gentoo.org/glsa/201908-12
https://ubuntu.com/security/notices/USN-4054-1
https://ubuntu.com/security/notices/USN-4060-1
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
https://www.mozilla.org/security/advisories/mfsa2019-21/
nss-util CVE-2019-17023 LOW 3.44.0-3.el7 3.53.1-1.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2019-17023
https://bugzilla.mozilla.org/show_bug.cgi?id=1590001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
https://linux.oracle.com/cve/CVE-2019-17023.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4234-1
https://ubuntu.com/security/notices/USN-4397-1
https://usn.ubuntu.com/4234-1/
https://usn.ubuntu.com/4397-1/
https://www.debian.org/security/2020/dsa-4726
https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023
https://www.mozilla.org/security/advisories/mfsa2020-01/
openldap CVE-2019-13057 MEDIUM 2.4.44-21.el7_6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9038
https://seclists.org/bugtraq/2019/Dec/23
https://security.netapp.com/advisory/ntap-20190822-0004/
https://support.apple.com/kb/HT210788
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/?findid=9038
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
openldap CVE-2019-13565 MEDIUM 2.4.44-21.el7_6
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://openldap.org/its/?findid=9052
https://seclists.org/bugtraq/2019/Dec/23
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.openldap.org/its/index.cgi/?findid=9052
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
openldap CVE-2020-12243 MEDIUM 2.4.44-21.el7_6 2.4.44-22.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html
https://access.redhat.com/security/cve/CVE-2020-12243
https://bugs.openldap.org/show_bug.cgi?id=9202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243
https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES
https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440
https://linux.oracle.com/cve/CVE-2020-12243.html
https://linux.oracle.com/errata/ELSA-2020-4041.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html
https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/
https://security.netapp.com/advisory/ntap-20200511-0003/
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4352-1
https://ubuntu.com/security/notices/USN-4352-2
https://usn.ubuntu.com/4352-1/
https://usn.ubuntu.com/4352-2/
https://www.debian.org/security/2020/dsa-4666
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
openldap CVE-2020-25692 MEDIUM 2.4.44-21.el7_6 2.4.44-23.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-25692
https://bugzilla.redhat.com/show_bug.cgi?id=1894567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692
https://linux.oracle.com/cve/CVE-2020-25692.html
https://linux.oracle.com/errata/ELSA-2021-1389.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25692
https://security.netapp.com/advisory/ntap-20210108-0006/
https://ubuntu.com/security/notices/USN-4622-1
https://ubuntu.com/security/notices/USN-4622-2
openldap CVE-2020-25709 MEDIUM 2.4.44-21.el7_6 2.4.44-25.el7_9
Expand...http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2020-25709
https://bugzilla.redhat.com/show_bug.cgi?id=1899675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25709.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
openldap CVE-2020-25710 MEDIUM 2.4.44-21.el7_6 2.4.44-25.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2020-25710
https://bugzilla.redhat.com/show_bug.cgi?id=1899678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710
https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
https://linux.oracle.com/cve/CVE-2020-25710.html
https://linux.oracle.com/errata/ELSA-2022-0621.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
https://security.netapp.com/advisory/ntap-20210716-0003/
https://ubuntu.com/security/notices/USN-4634-1
https://ubuntu.com/security/notices/USN-4634-2
https://www.debian.org/security/2020/dsa-4792
openldap CVE-2020-36221 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36221
https://bugs.openldap.org/show_bug.cgi?id=9404
https://bugs.openldap.org/show_bug.cgi?id=9424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36221
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36222 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36222
https://bugs.openldap.org/show_bug.cgi?id=9406
https://bugs.openldap.org/show_bug.cgi?id=9407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36222
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36223 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36223
https://bugs.openldap.org/show_bug.cgi?id=9408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36224 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36224
https://bugs.openldap.org/show_bug.cgi?id=9409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36225 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36225
https://bugs.openldap.org/show_bug.cgi?id=9412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36225
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36226 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36226
https://bugs.openldap.org/show_bug.cgi?id=9413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36226
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36227 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36227
https://bugs.openldap.org/show_bug.cgi?id=9428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36227
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36228 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36228
https://bugs.openldap.org/show_bug.cgi?id=9427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36228
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36229 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36229
https://bugs.openldap.org/show_bug.cgi?id=9425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2020-36230 MEDIUM 2.4.44-21.el7_6
Expand...http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36230
https://bugs.openldap.org/show_bug.cgi?id=9423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230
https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36230
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.debian.org/security/2021/dsa-4845
openldap CVE-2021-27212 MEDIUM 2.4.44-21.el7_6
Expand...https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.debian.org/security/2021/dsa-4860
openldap CVE-2022-29155 MEDIUM 2.4.44-21.el7_6
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
openldap CVE-2016-4984 LOW 2.4.44-21.el7_6
Expand...https://access.redhat.com/security/cve/CVE-2016-4984
https://bugzilla.redhat.com/show_bug.cgi?id=1346120
openldap CVE-2020-15719 LOW 2.4.44-21.el7_6
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
openssh CVE-2018-20685 MEDIUM 7.4p1-21.el7
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh CVE-2019-6111 MEDIUM 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh CVE-2020-14145 MEDIUM 7.4p1-21.el7
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
openssh CVE-2020-15778 MEDIUM 7.4p1-21.el7
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
openssh CVE-2021-41617 MEDIUM 7.4p1-21.el7 7.4p1-22.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
openssh CVE-2016-20012 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
openssh CVE-2018-15919 LOW 7.4p1-21.el7
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
openssh CVE-2019-6109 LOW 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh CVE-2019-6110 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
openssh-clients CVE-2018-20685 MEDIUM 7.4p1-21.el7
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-clients CVE-2019-6111 MEDIUM 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-clients CVE-2020-14145 MEDIUM 7.4p1-21.el7
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
openssh-clients CVE-2020-15778 MEDIUM 7.4p1-21.el7
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
openssh-clients CVE-2021-41617 MEDIUM 7.4p1-21.el7 7.4p1-22.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
openssh-clients CVE-2016-20012 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
openssh-clients CVE-2018-15919 LOW 7.4p1-21.el7
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
openssh-clients CVE-2019-6109 LOW 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-clients CVE-2019-6110 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
openssh-server CVE-2018-20685 MEDIUM 7.4p1-21.el7
Expand...http://www.securityfocus.com/bid/106531
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2018-20685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://linux.oracle.com/cve/CVE-2018-20685.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.gentoo.org/glsa/202007-53
https://security.netapp.com/advisory/ntap-20190215-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-server CVE-2019-6111 MEDIUM 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
http://www.openwall.com/lists/oss-security/2019/04/18/1
http://www.securityfocus.com/bid/106741
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6111
https://bugzilla.redhat.com/show_bug.cgi?id=1677794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6111.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://ubuntu.com/security/notices/USN-3885-2
https://usn.ubuntu.com/3885-1/
https://usn.ubuntu.com/3885-2/
https://www.debian.org/security/2019/dsa-4387
https://www.exploit-db.com/exploits/46193/
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-server CVE-2020-14145 MEDIUM 7.4p1-21.el7
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
openssh-server CVE-2020-15778 MEDIUM 7.4p1-21.el7
Expand...https://access.redhat.com/articles/5284081
https://access.redhat.com/security/cve/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://nvd.nist.gov/vuln/detail/CVE-2020-15778
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
openssh-server CVE-2021-41617 MEDIUM 7.4p1-21.el7 7.4p1-22.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
openssh-server CVE-2016-20012 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2016-20012
https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097
https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185
https://nvd.nist.gov/vuln/detail/CVE-2016-20012
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
https://www.openwall.com/lists/oss-security/2018/08/24/1
openssh-server CVE-2018-15919 LOW 7.4p1-21.el7
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://access.redhat.com/security/cve/CVE-2018-15919
https://security.netapp.com/advisory/ntap-20181221-0001/
openssh-server CVE-2019-6109 LOW 7.4p1-21.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
https://access.redhat.com/errata/RHSA-2019:3702
https://access.redhat.com/security/cve/CVE-2019-6109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://linux.oracle.com/cve/CVE-2019-6109.html
https://linux.oracle.com/errata/ELSA-2019-3702.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://ubuntu.com/security/notices/USN-3885-1
https://usn.ubuntu.com/3885-1/
https://www.debian.org/security/2019/dsa-4387
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
openssh-server CVE-2019-6110 LOW 7.4p1-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-6110
https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
openssl-devel CVE-2020-1971 HIGH 1:1.0.2k-19.el7 1:1.0.2k-21.el7_9
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
openssl-devel CVE-2022-0778 HIGH 1:1.0.2k-19.el7 1:1.0.2k-25.el7_9
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
openssl-devel CVE-2015-2808 MEDIUM 1:1.0.2k-19.el7
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
openssl-devel CVE-2019-1547 MEDIUM 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
openssl-devel CVE-2021-23840 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-22.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
openssl-devel CVE-2021-23841 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-22.el7_9
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
openssl-devel CVE-2021-3712 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-23.el7_9
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
openssl-devel CVE-2022-1292 MEDIUM 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
openssl-devel CVE-2022-2068 MEDIUM 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
openssl-devel CVE-2019-1551 LOW 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
openssl-devel CVE-2019-1563 LOW 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
openssl-devel CVE-2020-1968 LOW 1:1.0.2k-19.el7
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
openssl-devel CVE-2021-3601 LOW 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
openssl-libs CVE-2020-1971 HIGH 1:1.0.2k-19.el7 1:1.0.2k-21.el7_9
Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2
https://access.redhat.com/security/cve/CVE-2020-1971
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
https://linux.oracle.com/cve/CVE-2020-1971.html
https://linux.oracle.com/errata/ELSA-2021-9150.html
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://nvd.nist.gov/vuln/detail/CVE-2020-1971
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
https://security.gentoo.org/glsa/202012-13
https://security.netapp.com/advisory/ntap-20201218-0005/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4662-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2020/dsa-4807
https://www.openssl.org/news/secadv/20201208.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
openssl-libs CVE-2022-0778 HIGH 1:1.0.2k-19.el7 1:1.0.2k-25.el7_9
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
openssl-libs CVE-2015-2808 MEDIUM 1:1.0.2k-19.el7
Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
openssl-libs CVE-2019-1547 MEDIUM 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
openssl-libs CVE-2021-23840 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-22.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2021-23840
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://rustsec.org/advisories/RUSTSEC-2021-0057.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
openssl-libs CVE-2021-23841 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-22.el7_9
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
openssl-libs CVE-2021-3712 MEDIUM 1:1.0.2k-19.el7 1:1.0.2k-23.el7_9
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
openssl-libs CVE-2022-1292 MEDIUM 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
openssl-libs CVE-2022-2068 MEDIUM 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
openssl-libs CVE-2019-1551 LOW 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
openssl-libs CVE-2019-1563 LOW 1:1.0.2k-19.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
openssl-libs CVE-2020-1968 LOW 1:1.0.2k-19.el7
Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.
Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
openssl-libs CVE-2021-3601 LOW 1:1.0.2k-19.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
p11-kit CVE-2020-29361 MEDIUM 0.23.5-3.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.debian.org/security/2021/dsa-4822
p11-kit CVE-2020-29362 MEDIUM 0.23.5-3.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.debian.org/security/2021/dsa-4822
p11-kit-trust CVE-2020-29361 MEDIUM 0.23.5-3.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.debian.org/security/2021/dsa-4822
p11-kit-trust CVE-2020-29362 MEDIUM 0.23.5-3.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.debian.org/security/2021/dsa-4822
pcre CVE-2017-6004 MEDIUM 8.32-17.el7
Expand...http://www.securityfocus.com/bid/96295
http://www.securitytracker.com/id/1037850
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-6004
https://bugs.exim.org/show_bug.cgi?id=2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201706-11
https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
pcre CVE-2017-7186 MEDIUM 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97030
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7186
https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
https://bugs.exim.org/show_bug.cgi?id=2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186
https://security.gentoo.org/glsa/201710-09
https://security.gentoo.org/glsa/201710-25
https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
pcre CVE-2015-8382 LOW 8.32-17.el7
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
pcre CVE-2017-11164 LOW 8.32-17.el7
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
pcre CVE-2017-7244 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
pcre CVE-2017-7245 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
pcre CVE-2017-7246 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
pcre CVE-2020-14155 LOW 8.32-17.el7
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
pcre-devel CVE-2017-6004 MEDIUM 8.32-17.el7
Expand...http://www.securityfocus.com/bid/96295
http://www.securitytracker.com/id/1037850
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-6004
https://bugs.exim.org/show_bug.cgi?id=2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201706-11
https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
pcre-devel CVE-2017-7186 MEDIUM 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97030
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7186
https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
https://bugs.exim.org/show_bug.cgi?id=2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186
https://security.gentoo.org/glsa/201710-09
https://security.gentoo.org/glsa/201710-25
https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
pcre-devel CVE-2015-8382 LOW 8.32-17.el7
Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
pcre-devel CVE-2017-11164 LOW 8.32-17.el7
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
pcre-devel CVE-2017-7244 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
pcre-devel CVE-2017-7245 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
pcre-devel CVE-2017-7246 LOW 8.32-17.el7
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
pcre-devel CVE-2020-14155 LOW 8.32-17.el7
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
perl CVE-2015-8853 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl CVE-2016-1238 MEDIUM 4:5.16.3-295.el7
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
perl CVE-2016-2381 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl CVE-2016-6185 MEDIUM 4:5.16.3-295.el7
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl CVE-2020-10543 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl CVE-2020-10878 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl CVE-2020-12723 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl CVE-2020-16156 MEDIUM 4:5.16.3-295.el7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl CVE-2013-7422 LOW 4:5.16.3-295.el7
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl-Data-Dumper CVE-2014-4330 LOW 2.145-3.el7
Expand...http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
http://seclists.org/fulldisclosure/2014/Sep/84
http://seclists.org/oss-sec/2014/q3/692
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2014-4330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://ubuntu.com/security/notices/USN-2916-1
https://www.lsexperts.de/advisories/lse-2014-06-10.txt
perl-File-Path CVE-2017-6512 LOW 2.09-2.el7
Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-Git CVE-2017-14867 MEDIUM 1.8.3.1-23.el7_8
Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9
http://www.securityfocus.com/bid/101060
http://www.securitytracker.com/id/1039431
https://access.redhat.com/security/cve/CVE-2017-14867
https://bugs.debian.org/876854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867
https://lists.debian.org/debian-security-announce/2017/msg00246.html
https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u
https://ubuntu.com/security/notices/USN-3438-1
https://www.debian.org/security/2017/dsa-3984
perl-Git CVE-2018-1000021 MEDIUM 1.8.3.1-23.el7_8
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
perl-Git CVE-2019-1348 MEDIUM 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348
https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1348.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://security.gentoo.org/glsa/202003-42
https://support.apple.com/kb/HT210729
https://ubuntu.com/security/notices/USN-4220-1
perl-Git CVE-2019-1349 MEDIUM 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/errata/RHSA-2020:0228
https://access.redhat.com/security/cve/CVE-2019-1349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349
https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7
https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4
https://linux.oracle.com/cve/CVE-2019-1349.html
https://linux.oracle.com/errata/ELSA-2019-4356.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/
https://security.gentoo.org/glsa/202003-30
https://ubuntu.com/security/notices/USN-4220-1
perl-Git CVE-2021-21300 MEDIUM 1.8.3.1-23.el7_8
Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html
http://seclists.org/fulldisclosure/2021/Apr/60
http://www.openwall.com/lists/oss-security/2021/03/09/3
https://access.redhat.com/security/cve/CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks
https://git-scm.com/docs/gitattributes#_filter
https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592
https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/
https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/
https://security.gentoo.org/glsa/202104-01
https://support.apple.com/kb/HT212320
https://ubuntu.com/security/notices/USN-4761-1
perl-Git CVE-2021-40330 MEDIUM 1.8.3.1-23.el7_8
Expand...https://access.redhat.com/security/cve/CVE-2021-40330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330
https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
https://github.com/git/git/compare/v2.30.0...v2.30.1
https://nvd.nist.gov/vuln/detail/CVE-2021-40330
https://ubuntu.com/security/notices/USN-5076-1
perl-Git CVE-2022-24765 MEDIUM 1.8.3.1-23.el7_8
Expand...http://seclists.org/fulldisclosure/2022/May/31
http://www.openwall.com/lists/oss-security/2022/04/12/7
https://access.redhat.com/security/cve/CVE-2022-24765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
https://support.apple.com/kb/HT213261
https://ubuntu.com/security/notices/USN-5376-1
https://ubuntu.com/security/notices/USN-5376-2
https://ubuntu.com/security/notices/USN-5376-3
perl-Git CVE-2017-15298 LOW 1.8.3.1-23.el7_8
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
https://access.redhat.com/security/cve/CVE-2017-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298
https://github.com/Katee/git-bomb
https://kate.io/blog/git-bomb/
https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2
https://ubuntu.com/security/notices/USN-3829-1
https://usn.ubuntu.com/3829-1/
perl-Pod-Escapes CVE-2015-8853 MEDIUM 1:1.04-295.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-Pod-Escapes CVE-2016-1238 MEDIUM 1:1.04-295.el7
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
perl-Pod-Escapes CVE-2016-2381 MEDIUM 1:1.04-295.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl-Pod-Escapes CVE-2016-6185 MEDIUM 1:1.04-295.el7
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-Pod-Escapes CVE-2020-10543 MEDIUM 1:1.04-295.el7 1:1.04-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-Pod-Escapes CVE-2020-10878 MEDIUM 1:1.04-295.el7 1:1.04-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-Pod-Escapes CVE-2020-12723 MEDIUM 1:1.04-295.el7 1:1.04-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-Pod-Escapes CVE-2020-16156 MEDIUM 1:1.04-295.el7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-Pod-Escapes CVE-2013-7422 LOW 1:1.04-295.el7
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl-libs CVE-2015-8853 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-libs CVE-2016-1238 MEDIUM 4:5.16.3-295.el7
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
perl-libs CVE-2016-2381 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl-libs CVE-2016-6185 MEDIUM 4:5.16.3-295.el7
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-libs CVE-2020-10543 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-libs CVE-2020-10878 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-libs CVE-2020-12723 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-libs CVE-2020-16156 MEDIUM 4:5.16.3-295.el7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-libs CVE-2013-7422 LOW 4:5.16.3-295.el7
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
perl-macros CVE-2015-8853 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-macros CVE-2016-1238 MEDIUM 4:5.16.3-295.el7
Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
perl-macros CVE-2016-2381 MEDIUM 4:5.16.3-295.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
perl-macros CVE-2016-6185 MEDIUM 4:5.16.3-295.el7
Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
perl-macros CVE-2020-10543 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
https://linux.oracle.com/cve/CVE-2020-10543.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-macros CVE-2020-10878 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-10878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
https://linux.oracle.com/cve/CVE-2020-10878.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-macros CVE-2020-12723 MEDIUM 4:5.16.3-295.el7 4:5.16.3-299.el7_9
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html
https://access.redhat.com/security/cve/CVE-2020-12723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
https://github.com/Perl/perl5/issues/16947
https://github.com/Perl/perl5/issues/17743
https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
https://linux.oracle.com/cve/CVE-2020-12723.html
https://linux.oracle.com/errata/ELSA-2021-9238.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod
https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod
https://security.gentoo.org/glsa/202006-03
https://security.netapp.com/advisory/ntap-20200611-0001/
https://ubuntu.com/security/notices/USN-4602-1
https://ubuntu.com/security/notices/USN-4602-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
perl-macros CVE-2020-16156 MEDIUM 4:5.16.3-295.el7
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
perl-macros CVE-2013-7422 LOW 4:5.16.3-295.el7
Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
procps-ng CVE-2018-1121 LOW 3.3.10-26.el7
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps-ng CVE-2018-1123 LOW 3.3.10-26.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1123
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
procps-ng CVE-2018-1125 LOW 3.3.10-26.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1125
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
python CVE-2013-1664 MEDIUM 2.7.5-86.el7
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
python CVE-2013-1665 MEDIUM 2.7.5-86.el7
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
python CVE-2013-7040 MEDIUM 2.7.5-86.el7
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
python CVE-2017-1000158 MEDIUM 2.7.5-86.el7
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python CVE-2018-20852 MEDIUM 2.7.5-86.el7 2.7.5-88.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2018-20852
https://bugs.python.org/issue35121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://linux.oracle.com/cve/CVE-2018-20852.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html
https://security.gentoo.org/glsa/202003-26
https://ubuntu.com/security/notices/USN-4127-1
https://ubuntu.com/security/notices/USN-4127-2
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
python CVE-2019-16056 MEDIUM 2.7.5-86.el7 2.7.5-88.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2019-16056
https://bugs.python.org/issue34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
https://linux.oracle.com/cve/CVE-2019-16056.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20190926-0005/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
python CVE-2019-16935 MEDIUM 2.7.5-86.el7 2.7.5-89.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
python CVE-2019-18348 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
python CVE-2019-20907 MEDIUM 2.7.5-86.el7 2.7.5-90.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://access.redhat.com/security/cve/CVE-2019-20907
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://errata.almalinux.org/8/ALSA-2020-4654.html
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://nvd.nist.gov/vuln/detail/CVE-2019-20907
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
python CVE-2020-26116 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
https://access.redhat.com/security/cve/CVE-2020-26116
https://bugs.python.org/issue39603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://linux.oracle.com/cve/CVE-2020-26116.html
https://linux.oracle.com/errata/ELSA-2021-1879.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
https://nvd.nist.gov/vuln/detail/CVE-2020-26116
https://python-security.readthedocs.io/vuln/http-header-injection-method.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20201023-0001/
https://ubuntu.com/security/notices/USN-4581-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4581-1/
https://www.oracle.com/security-alerts/cpuoct2021.html
python CVE-2020-27619 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
python CVE-2020-8492 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
python CVE-2021-23336 MEDIUM 2.7.5-86.el7
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python CVE-2021-3177 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python CVE-2021-3733 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3733
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
python CVE-2021-4189 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python CVE-2022-0391 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
python CVE-2018-1000030 LOW 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python CVE-2019-9674 LOW 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
python CVE-2021-3737 LOW 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
python-libs CVE-2013-1664 MEDIUM 2.7.5-86.el7
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
python-libs CVE-2013-1665 MEDIUM 2.7.5-86.el7
Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.djangoproject.com/weblog/2013/feb/19/security/
python-libs CVE-2013-7040 MEDIUM 2.7.5-86.el7
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://support.apple.com/kb/HT205031
python-libs CVE-2017-1000158 MEDIUM 2.7.5-86.el7
Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.debian.org/security/2018/dsa-4307
python-libs CVE-2018-20852 MEDIUM 2.7.5-86.el7 2.7.5-88.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2018-20852
https://bugs.python.org/issue35121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://linux.oracle.com/cve/CVE-2018-20852.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://python-security.readthedocs.io/vuln/cookie-domain-check.html
https://security.gentoo.org/glsa/202003-26
https://ubuntu.com/security/notices/USN-4127-1
https://ubuntu.com/security/notices/USN-4127-2
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
python-libs CVE-2019-16056 MEDIUM 2.7.5-86.el7 2.7.5-88.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:3948
https://access.redhat.com/security/cve/CVE-2019-16056
https://bugs.python.org/issue34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
https://linux.oracle.com/cve/CVE-2019-16056.html
https://linux.oracle.com/errata/ELSA-2020-1764.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20190926-0005/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
python-libs CVE-2019-16935 MEDIUM 2.7.5-86.el7 2.7.5-89.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://access.redhat.com/security/cve/CVE-2019-16935
https://bugs.python.org/issue38243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935
https://errata.almalinux.org/8/ALSA-2020-1605.html
https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897
https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213
https://github.com/python/cpython/pull/16373
https://linux.oracle.com/cve/CVE-2019-16935.html
https://linux.oracle.com/errata/ELSA-2020-4433.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
https://security.netapp.com/advisory/ntap-20191017-0004/
https://ubuntu.com/security/notices/USN-4151-1
https://ubuntu.com/security/notices/USN-4151-2
https://usn.ubuntu.com/4151-1/
https://usn.ubuntu.com/4151-2/
https://www.oracle.com/security-alerts/cpujul2020.html
python-libs CVE-2019-18348 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
python-libs CVE-2019-20907 MEDIUM 2.7.5-86.el7 2.7.5-90.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://access.redhat.com/security/cve/CVE-2019-20907
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://errata.almalinux.org/8/ALSA-2020-4654.html
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://nvd.nist.gov/vuln/detail/CVE-2019-20907
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
python-libs CVE-2020-26116 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html
https://access.redhat.com/security/cve/CVE-2020-26116
https://bugs.python.org/issue39603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://linux.oracle.com/cve/CVE-2020-26116.html
https://linux.oracle.com/errata/ELSA-2021-1879.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/
https://nvd.nist.gov/vuln/detail/CVE-2020-26116
https://python-security.readthedocs.io/vuln/http-header-injection-method.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20201023-0001/
https://ubuntu.com/security/notices/USN-4581-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4581-1/
https://www.oracle.com/security-alerts/cpuoct2021.html
python-libs CVE-2020-27619 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
python-libs CVE-2020-8492 MEDIUM 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
python-libs CVE-2021-23336 MEDIUM 2.7.5-86.el7
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python-libs CVE-2021-3177 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3177
https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://nvd.nist.gov/vuln/detail/CVE-2021-3177
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
python-libs CVE-2021-3733 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3733
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
python-libs CVE-2021-4189 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://ubuntu.com/security/notices/USN-5342-1
python-libs CVE-2022-0391 MEDIUM 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://www.oracle.com/security-alerts/cpuapr2022.html
python-libs CVE-2018-1000030 LOW 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
python-libs CVE-2019-9674 LOW 2.7.5-86.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
python-libs CVE-2021-3737 LOW 2.7.5-86.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
readline CVE-2016-7091 LOW 6.2-11.el7
Expand...http://www.securityfocus.com/bid/92615
https://access.redhat.com/security/cve/CVE-2016-7091
https://linux.oracle.com/cve/CVE-2016-7091.html
https://linux.oracle.com/errata/ELSA-2016-2593.html
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html
https://rhn.redhat.com/errata/RHSA-2016-2593.html
rpm CVE-2017-7500 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
rpm CVE-2017-7501 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
rpm CVE-2021-20271 MEDIUM 4.11.3-40.el7 4.11.3-48.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
rpm CVE-2021-3421 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
rpm CVE-2021-3521 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
rpm CVE-2021-35937 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
rpm CVE-2021-35938 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
rpm CVE-2021-35939 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
rpm CVE-2021-20266 LOW 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
rpm-build-libs CVE-2017-7500 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
rpm-build-libs CVE-2017-7501 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
rpm-build-libs CVE-2021-20271 MEDIUM 4.11.3-40.el7 4.11.3-48.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
rpm-build-libs CVE-2021-3421 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
rpm-build-libs CVE-2021-3521 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
rpm-build-libs CVE-2021-35937 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
rpm-build-libs CVE-2021-35938 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
rpm-build-libs CVE-2021-35939 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
rpm-build-libs CVE-2021-20266 LOW 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
rpm-libs CVE-2017-7500 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
rpm-libs CVE-2017-7501 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
rpm-libs CVE-2021-20271 MEDIUM 4.11.3-40.el7 4.11.3-48.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
rpm-libs CVE-2021-3421 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
rpm-libs CVE-2021-3521 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
rpm-libs CVE-2021-35937 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
rpm-libs CVE-2021-35938 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
rpm-libs CVE-2021-35939 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
rpm-libs CVE-2021-20266 LOW 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
rpm-python CVE-2017-7500 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
rpm-python CVE-2017-7501 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201811-22
rpm-python CVE-2021-20271 MEDIUM 4.11.3-40.el7 4.11.3-48.el7_9
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-20271
https://bugzilla.redhat.com/show_bug.cgi?id=1934125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://linux.oracle.com/cve/CVE-2021-20271.html
https://linux.oracle.com/errata/ELSA-2021-4785.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-20271
https://security.gentoo.org/glsa/202107-43
rpm-python CVE-2021-3421 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
rpm-python CVE-2021-3521 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
rpm-python CVE-2021-35937 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35937
rpm-python CVE-2021-35938 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35938
rpm-python CVE-2021-35939 MEDIUM 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-35939
rpm-python CVE-2021-20266 LOW 4.11.3-40.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
rsync CVE-2014-9512 MEDIUM 3.1.2-10.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.securityfocus.com/bid/76093
http://www.securitytracker.com/id/1034786
http://www.ubuntu.com/usn/USN-2879-1
http://xteam.baidu.com/?p=169
https://access.redhat.com/security/cve/CVE-2014-9512
https://bugzilla.samba.org/show_bug.cgi?id=10977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512
https://security.gentoo.org/glsa/201605-04
https://support.apple.com/kb/HT211168
https://support.apple.com/kb/HT211170
https://support.apple.com/kb/HT211171
https://support.apple.com/kb/HT211175
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-2879-1
rsync CVE-2017-15994 MEDIUM 3.1.2-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-15994
https://git.samba.org/?p=rsync.git;a=commit;h=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3
https://git.samba.org/?p=rsync.git;a=commit;h=9a480deec4d20277d8e20bc55515ef0640ca1e55
https://git.samba.org/?p=rsync.git;a=commit;h=c252546ceeb0925eb8a4061315e3ff0a8c55b48b
rsync CVE-2017-16548 MEDIUM 3.1.2-10.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-16548
https://bugzilla.samba.org/show_bug.cgi?id=13112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
https://usn.ubuntu.com/3543-2/
https://www.debian.org/security/2017/dsa-4068
rsync CVE-2017-17433 MEDIUM 3.1.2-10.el7
Expand...http://security.cucumberlinux.com/security/details.php?id=169
https://access.redhat.com/security/cve/CVE-2017-17433
https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433
https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
rsync CVE-2017-17434 MEDIUM 3.1.2-10.el7
Expand...http://security.cucumberlinux.com/security/details.php?id=170
https://access.redhat.com/security/cve/CVE-2017-17434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434
https://git.samba.org/?p=rsync.git;a=commit;h=5509597decdbd7b91994210f700329d8a35e70a1
https://git.samba.org/?p=rsync.git;a=commit;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9
https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html
https://ubuntu.com/security/notices/USN-3506-1
https://ubuntu.com/security/notices/USN-3506-2
https://www.debian.org/security/2017/dsa-4068
rsync CVE-2018-5764 MEDIUM 3.1.2-10.el7
Expand...http://www.securityfocus.com/bid/102803
http://www.securitytracker.com/id/1040276
https://access.redhat.com/security/cve/CVE-2018-5764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764
https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html
https://security.gentoo.org/glsa/201805-04
https://ubuntu.com/security/notices/USN-3543-1
https://ubuntu.com/security/notices/USN-3543-2
https://usn.ubuntu.com/3543-1/
shared-mime-info CVE-2019-3820 MEDIUM 1.8-4.el7 1.8-5.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-3820
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820
https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
https://linux.oracle.com/cve/CVE-2019-3820.html
https://linux.oracle.com/errata/ELSA-2020-1021.html
https://ubuntu.com/security/notices/USN-3966-1
https://usn.ubuntu.com/3966-1/
sqlite CVE-2019-13734 HIGH 3.7.17-8.el7 3.7.17-8.el7_7.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/errata/RHSA-2020:0227
https://access.redhat.com/errata/RHSA-2020:0229
https://access.redhat.com/errata/RHSA-2020:0273
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/errata/RHSA-2020:0463
https://access.redhat.com/errata/RHSA-2020:0476
https://access.redhat.com/security/cve/CVE-2019-13734
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734
https://linux.oracle.com/cve/CVE-2019-13734.html
https://linux.oracle.com/errata/ELSA-2020-0273.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
https://www.oracle.com/security-alerts/cpujan2022.html
sqlite CVE-2015-7036 MEDIUM 3.7.17-8.el7
Expand...http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://zerodayinitiative.com/advisories/ZDI-15-570/
https://access.redhat.com/security/cve/CVE-2015-7036
https://security.gentoo.org/glsa/201612-21
sqlite CVE-2017-7000 MEDIUM 3.7.17-8.el7
Expand...http://www.securityfocus.com/bid/98767
http://www.securityfocus.com/bid/99950
https://access.redhat.com/errata/RHSA-2017:1833
https://access.redhat.com/security/cve/CVE-2017-7000
https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7000
https://security.gentoo.org/glsa/201709-15
https://support.apple.com/HT207797
https://support.apple.com/HT207798
https://www.debian.org/security/2017/dsa-3926
https://www.sqlite.org/bindptr.html
sqlite CVE-2019-13751 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13751
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751
https://linux.oracle.com/cve/CVE-2019-13751.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
sqlite CVE-2019-13752 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13752
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752
https://linux.oracle.com/cve/CVE-2019-13752.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
sqlite CVE-2019-13753 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13753
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753
https://linux.oracle.com/cve/CVE-2019-13753.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.debian.org/security/2020/dsa-4606
sqlite CVE-2019-19603 MEDIUM 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
sqlite CVE-2019-19645 MEDIUM 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
sqlite CVE-2019-19880 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
https://access.redhat.com/errata/RHSA-2020:0514
https://access.redhat.com/security/cve/CVE-2019-19880
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54
https://security.netapp.com/advisory/ntap-20200114-0001/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.debian.org/security/2020/dsa-4638
https://www.oracle.com/security-alerts/cpuapr2020.html
sqlite CVE-2019-19924 MEDIUM 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
sqlite CVE-2019-20218 MEDIUM 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-20218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387
https://linux.oracle.com/cve/CVE-2019-20218.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html
https://security.gentoo.org/glsa/202007-26
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
sqlite CVE-2019-5827 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
https://access.redhat.com/security/cve/CVE-2019-5827
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
https://crbug.com/952406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
https://linux.oracle.com/cve/CVE-2019-5827.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://seclists.org/bugtraq/2019/Aug/19
https://security.gentoo.org/glsa/202003-16
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.debian.org/security/2019/dsa-4500
sqlite CVE-2019-8457 MEDIUM 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
sqlite CVE-2020-13435 MEDIUM 3.7.17-8.el7
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
https://linux.oracle.com/cve/CVE-2020-13435.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200528-0004/
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.sqlite.org/src/info/7a5279a25c57adf1
sqlite CVE-2020-13631 MEDIUM 3.7.17-8.el7
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
sqlite CVE-2016-6153 LOW 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html
http://www.openwall.com/lists/oss-security/2016/07/01/1
http://www.openwall.com/lists/oss-security/2016/07/01/2
http://www.securityfocus.com/bid/91546
http://www.sqlite.org/cgi/src/info/67985761aa93fb61
https://access.redhat.com/security/cve/CVE-2016-6153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
https://www.sqlite.org/releaselog/3_13_0.html
https://www.tenable.com/security/tns-2016-20
sqlite CVE-2017-10989 LOW 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://marc.info/?l=sqlite-users&m=149933696214713&w=2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/99502
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-10989
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://sqlite.org/src/info/66de6f4a
https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
sqlite CVE-2017-13685 LOW 3.7.17-8.el7
Expand...http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
sqlite CVE-2017-15286 LOW 3.7.17-8.el7
Expand...http://www.securityfocus.com/bid/101285
https://access.redhat.com/security/cve/CVE-2017-15286
https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
sqlite CVE-2018-8740 LOW 3.7.17-8.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://www.securityfocus.com/bid/103466
https://access.redhat.com/security/cve/CVE-2018-8740
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://ubuntu.com/security/notices/USN-4205-1
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4205-1/
https://usn.ubuntu.com/4394-1/
https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
sqlite CVE-2019-19244 LOW 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
sqlite CVE-2021-45346 LOW 3.7.17-8.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
systemd CVE-2013-4392 MEDIUM 219-67.el7_7.1
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
systemd CVE-2017-18078 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
systemd CVE-2018-6954 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
systemd CVE-2019-3842 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
systemd CVE-2020-13529 MEDIUM 219-67.el7_7.1
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
systemd CVE-2020-13776 MEDIUM 219-67.el7_7.1
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
systemd CVE-2021-3997 MEDIUM 219-67.el7_7.1
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
systemd CVE-2016-6349 LOW 219-67.el7_7.1
Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
systemd CVE-2019-20386 LOW 219-67.el7_7.1 219-78.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
systemd-libs CVE-2013-4392 MEDIUM 219-67.el7_7.1
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
systemd-libs CVE-2017-18078 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
systemd-libs CVE-2018-6954 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
systemd-libs CVE-2019-3842 MEDIUM 219-67.el7_7.1
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.exploit-db.com/exploits/46743/
systemd-libs CVE-2020-13529 MEDIUM 219-67.el7_7.1
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
systemd-libs CVE-2020-13776 MEDIUM 219-67.el7_7.1
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
systemd-libs CVE-2021-3997 MEDIUM 219-67.el7_7.1
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
systemd-libs CVE-2016-6349 LOW 219-67.el7_7.1
Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
systemd-libs CVE-2019-20386 LOW 219-67.el7_7.1 219-78.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
tar CVE-2005-2541 MEDIUM 2:1.26-35.el7
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
tar CVE-2016-6321 MEDIUM 2:1.26-35.el7
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
http://seclists.org/fulldisclosure/2016/Oct/102
http://seclists.org/fulldisclosure/2016/Oct/96
http://www.debian.org/security/2016/dsa-3702
http://www.securityfocus.com/bid/93937
http://www.ubuntu.com/usn/USN-3132-1
https://access.redhat.com/security/cve/CVE-2016-6321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201611-19
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
https://ubuntu.com/security/notices/USN-3132-1
tar CVE-2018-20482 LOW 2:1.26-35.el7
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://www.securityfocus.com/bid/106354
https://access.redhat.com/security/cve/CVE-2018-20482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
https://news.ycombinator.com/item?id=18745431
https://security.gentoo.org/glsa/201903-05
https://twitter.com/thatcks/status/1076166645708668928
https://ubuntu.com/security/notices/USN-4692-1
https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
tar CVE-2019-9923 LOW 2:1.26-35.el7
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
tar CVE-2021-20193 LOW 2:1.26-35.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
unzip CVE-2015-7696 MEDIUM 6.0-21.el7
Expand...http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/09/21/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696
https://nvd.nist.gov/vuln/detail/CVE-2015-7696
https://ubuntu.com/security/notices/USN-2788-1
unzip CVE-2015-7697 MEDIUM 6.0-21.el7
Expand...http://sourceforge.net/p/infozip/patches/23/
http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697
https://nvd.nist.gov/vuln/detail/CVE-2015-7697
https://ubuntu.com/security/notices/USN-2788-1
unzip CVE-2014-9913 LOW 6.0-21.el7
Expand...http://openwall.com/lists/oss-security/2016/12/05/20
http://www.openwall.com/lists/oss-security/2014/11/03/5
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/95081
https://access.redhat.com/security/cve/CVE-2014-9913
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913
https://nvd.nist.gov/vuln/detail/CVE-2014-9913
https://ubuntu.com/security/notices/USN-4672-1
unzip CVE-2016-9844 LOW 6.0-21.el7
Expand...http://openwall.com/lists/oss-security/2016/12/05/20
http://openwall.com/lists/oss-security/2016/12/05/25
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/94728
https://access.redhat.com/security/cve/CVE-2016-9844
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844
https://nvd.nist.gov/vuln/detail/CVE-2016-9844
https://ubuntu.com/security/notices/USN-4672-1
unzip CVE-2018-1000035 LOW 6.0-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2018-1000035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035
https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1000035
https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
https://security.gentoo.org/glsa/202003-58
https://ubuntu.com/security/notices/USN-4672-1
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
unzip CVE-2021-4217 LOW 6.0-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-4217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
unzip CVE-2022-0529 LOW 6.0-21.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0529
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0529
unzip CVE-2022-0530 LOW 6.0-21.el7
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-0530
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0530
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
util-linux CVE-2014-9114 MEDIUM 2.23.2-61.el7
Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/201612-14
util-linux CVE-2016-2779 MEDIUM 2.23.2-61.el7
Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
util-linux CVE-2022-0563 MEDIUM 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
util-linux CVE-2015-5218 LOW 2.23.2-61.el7
Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
util-linux CVE-2021-37600 LOW 2.23.2-61.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
vim-minimal CVE-2019-20807 MEDIUM 2:7.4.629-6.el7
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://access.redhat.com/security/cve/CVE-2019-20807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20807
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
vim-minimal CVE-2021-3778 MEDIUM 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3778
https://ubuntu.com/security/notices/USN-5093-1
vim-minimal CVE-2021-3796 MEDIUM 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3796
https://ubuntu.com/security/notices/USN-5093-1
vim-minimal CVE-2021-3872 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2021-3872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://nvd.nist.gov/vuln/detail/CVE-2021-3872
https://ubuntu.com/security/notices/USN-5147-1
vim-minimal CVE-2021-3984 MEDIUM 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-3984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3984
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2021-4019 MEDIUM 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-4019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-4019
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2021-4192 MEDIUM 2:7.4.629-6.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2021-4193 MEDIUM 2:7.4.629-6.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
vim-minimal CVE-2022-0359 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
vim-minimal CVE-2022-1619 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
vim-minimal CVE-2022-1621 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
vim-minimal CVE-2022-1629 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629
https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1629
vim-minimal CVE-2022-2129 MEDIUM 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2129
https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
vim-minimal CVE-2017-1000382 LOW 2:7.4.629-6.el7
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
https://access.redhat.com/security/cve/CVE-2017-1000382
vim-minimal CVE-2017-11109 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2017-11109
https://bugzilla.redhat.com/show_bug.cgi?id=1468492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11109
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
https://www.mail-archive.com/vim_dev@googlegroups.com/msg45274.html
vim-minimal CVE-2017-17087 LOW 2:7.4.629-6.el7
Expand...http://openwall.com/lists/oss-security/2017/11/27/2
http://security.cucumberlinux.com/security/details.php?id=166
https://access.redhat.com/security/cve/CVE-2017-17087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087
https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
vim-minimal CVE-2017-5953 LOW 2:7.4.629-6.el7
Expand...http://www.debian.org/security/2017/dsa-3786
http://www.securityfocus.com/bid/96217
https://access.redhat.com/security/cve/CVE-2017-5953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953
https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d
https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4016-1
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4016-1/
https://usn.ubuntu.com/4309-1/
vim-minimal CVE-2017-6350 LOW 2:7.4.629-6.el7
Expand...http://www.securityfocus.com/bid/96448
http://www.securitytracker.com/id/1037949
https://access.redhat.com/security/cve/CVE-2017-6350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350
https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
vim-minimal CVE-2021-3903 LOW 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3903
https://ubuntu.com/security/notices/USN-5147-1
vim-minimal CVE-2021-3927 LOW 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://nvd.nist.gov/vuln/detail/CVE-2021-3927
https://ubuntu.com/security/notices/USN-5147-1
vim-minimal CVE-2021-3974 LOW 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3974
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2021-4069 LOW 2:7.4.629-6.el7
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://nvd.nist.gov/vuln/detail/CVE-2021-4069
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2021-4166 LOW 2:7.4.629-6.el7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
vim-minimal CVE-2022-0351 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
vim-minimal CVE-2022-1154 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
vim-minimal CVE-2022-1720 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-1720
https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
vim-minimal CVE-2022-2124 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2124
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
vim-minimal CVE-2022-2125 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2125
https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
vim-minimal CVE-2022-2126 LOW 2:7.4.629-6.el7
Expand...https://access.redhat.com/security/cve/CVE-2022-2126
https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
wget CVE-2021-31879 MEDIUM 1.14-18.el7_6.1
Expand...https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
wget CVE-2017-6508 LOW 1.14-18.el7_6.1
Expand...http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html
http://www.securityfocus.com/bid/96877
https://access.redhat.com/security/cve/CVE-2017-6508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508
https://security.gentoo.org/glsa/201706-16
https://ubuntu.com/security/notices/USN-3464-1
https://ubuntu.com/security/notices/USN-3464-2
xz CVE-2022-1271 HIGH 5.2.2-1.el7 5.2.2-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-5052.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
xz-libs CVE-2022-1271 HIGH 5.2.2-1.el7 5.2.2-2.el7_9
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-5052.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
zlib CVE-2018-25032 HIGH 1.2.7-18.el7 1.2.7-20.el7_9
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
zlib-devel CVE-2018-25032 HIGH 1.2.7-18.el7 1.2.7-20.el7_9
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

node-pkg

No Vulnerabilities found

python-pkg

Package Vulnerability Severity Installed Version Fixed Version Links
pip CVE-2021-3572 MEDIUM 21.0.1 21.1
Expand...https://access.redhat.com/errata/RHSA-2021:3254
https://access.redhat.com/security/cve/CVE-2021-3572
https://bugzilla.redhat.com/show_bug.cgi?id=1962856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572
https://github.com/advisories/GHSA-5xp3-jfq3-5q8x
https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
https://github.com/pypa/pip/issues/10042
https://github.com/pypa/pip/issues/10042#issuecomment-857452480
https://github.com/pypa/pip/pull/9827
https://github.com/skazi0/CVE-2021-3572/blob/master/CVE-2021-3572-v9.0.1.patch
https://linux.oracle.com/cve/CVE-2021-3572.html
https://linux.oracle.com/errata/ELSA-2021-4455.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3572
https://packetstormsecurity.com/files/162712/USN-4961-1.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
urllib3 CVE-2021-33503 HIGH 1.25.11 1.26.5
Expand...https://access.redhat.com/security/cve/CVE-2021-33503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec
https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg
https://linux.oracle.com/cve/CVE-2021-33503.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/
https://nvd.nist.gov/vuln/detail/CVE-2021-33503
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html

No Vulnerabilities found

No Vulnerabilities found

No Vulnerabilities found

No Vulnerabilities found

No Vulnerabilities found

No Vulnerabilities found

No Vulnerabilities found